Impact
The Qzzr Shortcode Plugin for WordPress allows arbitrary JavaScript to be stored via the 'quiz' attribute of the 'qzzr' shortcode. This stored cross‑site scripting flaw means that a page containing the injected code will execute the attacker’s script in the context of any user who visits that page, potentially exposing session cookies or enabling broader malicious actions. The weakness is a classic input validation error categorized as CWE‑79.
Affected Systems
All releases of the Qzzr Shortcode Plugin up to and including version 1.0.1, used within any WordPress site.
Risk and Exploitability
The CVSS score of 6.4 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an authenticated user with contributor level or higher, making it a privilege‑based attack that can be carried out by anyone with such access on a partnered site.
OpenCVE Enrichment