Description
The SM CountDown Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's smcountdown shortcode in versions less than, or equal to, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-10-22
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The SM CountDown Widget plugin for WordPress is vulnerable to Stored Cross‑Site Scripting because the plugin does not properly sanitise or escape user‑supplied attributes of the smcountdown shortcode. This flaw allows an authenticated user with contributor‑level access or higher to inject malicious JavaScript that is persisted and will run whenever the affected page is rendered, potentially affecting any visitor who loads that page. The weakness is classified as CWE‑79.

Affected Systems

WordPress sites that have the SM CountDown Widget plugin installed, in any version up to and including 1.2 released by Sierramike. Only users with at least contributor privileges can exploit the flaw, but the malicious code will execute for all site visitors when the stored data is displayed.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate impact, while the EPSS score of less than 1% shows that real‑world exploitation is currently considered low probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authentication to the WordPress site as a contributor or higher, the attacker then creates or edits a shortcode instance with injected script content that is later stored in the database. When any user opens the page containing the shortcode, the injected script runs in the context of the site, enabling data theft, session hijacking, or defacement.

Generated by OpenCVE AI on April 22, 2026 at 14:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SM CountDown Widget plugin to the latest available version that removes the XSS flaw.
  • Revoke or limit contributor access on the site to users who truly need it, and review roles for unnecessary permissions.
  • If an update cannot be applied immediately, disable or remove the widget shortcode from the site’s pages until a patch is installed to prevent further injection.

Generated by OpenCVE AI on April 22, 2026 at 14:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The SM CountDown Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's smcountdown shortcode in versions less than, or equal to, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title SM CountDown Widget <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:00.535Z

Reserved: 2025-10-16T17:41:28.982Z

Link: CVE-2025-11880

cve-icon Vulnrichment

Updated: 2025-10-22T13:22:29.434Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T09:15:35.850

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11880

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:15:20Z

Weaknesses