Description
The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via adding scripts in all versions up to, and including, 1.1.6 due to insufficient capability checks. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Plugin
AI Analysis

Impact

The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to stored cross‑site scripting because it lacks proper capability checks when saving scripts in the header and footer options. Authenticated users with Author‑level access or higher can inject arbitrary HTML or JavaScript that is persisted in the plugin’s configuration. When other site visitors load a page that includes the injected header or footer, the malicious script runs in their browsers, potentially stealing credentials, hijacking sessions, or defacing content.

Affected Systems

All WordPress installations that have the Insert Headers and Footers Code – HT Script plugin installed in versions up to and including 1.1.6 are affected. The plugin is commonly used on sites that allow authors to add custom scripts to the page header or footer.

Risk and Exploitability

The vulnerability has a CVSS score of 6.4, indicating moderate severity, and an EPSS score of less than 1 %, suggesting a low likelihood of widespread exploitation at this time. It is not listed in the CISA KEV catalog. Exploitation requires only author‑level access on the target WordPress site, a relatively common privilege level, which means any site with multiple authors could be vulnerable. If an attacker successfully injects malicious scripts, they can compromise the confidentiality and integrity of site visitors’ data and potentially spread worms via the injected code.

Generated by OpenCVE AI on April 21, 2026 at 18:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the plugin to the most recent version available from the WordPress plugin repository that resolves the vulnerability.
  • If an update is not immediately possible, limit the ability to add or edit header/footer scripts to administrators only or remove the capability for author‑level users.
  • As a temporary measure, disable or uninstall the Insert Headers and Footers Code – HT Script plugin until a patched version is released.

Generated by OpenCVE AI on April 21, 2026 at 18:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 08 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via adding scripts in all versions up to, and including, 1.1.6 due to insufficient capability checks. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Insert Headers and Footers Code – HT Script <= 1.1.6 - Authenticated (Author+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:11.156Z

Reserved: 2025-10-23T15:11:52.238Z

Link: CVE-2025-12112

cve-icon Vulnrichment

Updated: 2025-11-10T19:50:45.261Z

cve-icon NVD

Status : Deferred

Published: 2025-11-08T04:15:44.303

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses