Impact
The EchBay Admin Security plugin for WordPress contains a reflected Cross‑Site Scripting flaw (CWE‑79) triggered by the '_ebnonce' query parameter. The plugin does not properly sanitize or escape this input before rendering it in page content, allowing an unauthenticated attacker to inject arbitrary JavaScript that will execute when a victim opens a crafted link.
Affected Systems
WordPress sites that have the EchBay Admin Security plugin version 1.3.0 or earlier, distributed by itvn9online.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity, while an EPSS value of less than 1% suggests a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Attacks require social engineering to get a user to click a malicious link, and no authenticated access is necessary. When executed, the injected scripts run with the victim’s browser privileges, potentially allowing unintended client‑side actions.
OpenCVE Enrichment