Description
The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the category and tag 'name' parameters in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-04
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting for authenticated users
Action: Upgrade Plugin
AI Analysis

Impact

The Orbit Fox Companion WordPress plugin is affected by a stored cross‑site scripting flaw that is triggered by entering malicious content into the category or tag 'name' fields. Because the plugin fails to properly sanitize or escape these inputs, an authenticated user with author-level or higher permissions can store arbitrary scripts on taxonomy terms. These scripts execute automatically when any visitor views a page that uses the compromised taxonomy, allowing the attacker to run code in the context of the site.

Affected Systems

The affected product is the Orbit Fox Companion plugin, developed by themeisle, for WordPress. All releases through version 3.0.2 are impacted, including the variant that includes Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS value of less than 1% shows a low probability of real‑world exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to have WordPress author or higher privileges and the ability to edit taxonomy term names. Once injected, the script persists and affects all users who view pages using the contaminated taxonomy.

Generated by OpenCVE AI on April 27, 2026 at 22:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Orbit Fox Companion plugin to a version newer than 3.0.2.
  • Restrict taxonomy editing capabilities for author-level users so that only administrators can modify the 'name' fields.
  • Implement a content security policy that disallows inline scripts and limits script sources to trusted origins.

Generated by OpenCVE AI on April 27, 2026 at 22:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 04 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Themeisle
Themeisle orbit Fox
Wordpress
Wordpress wordpress
Vendors & Products Themeisle
Themeisle orbit Fox
Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the category and tag 'name' parameters in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Orbit Fox Companion <= 3.0.2 - Authenticated (Author+) Stored Cross-Site Scripting via Post Taxonomy
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Themeisle Orbit Fox
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:40.296Z

Reserved: 2025-10-21T19:37:36.665Z

Link: CVE-2025-12045

cve-icon Vulnrichment

Updated: 2025-11-04T18:53:24.675Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T12:15:35.960

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:00:13Z

Weaknesses