Description
The Simple User Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpr_admin_msg' parameter in all versions up to, and including, 6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-21
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via unauthenticated stored XSS
Action: Apply Patch
AI Analysis

Impact

The Simple User Registration WordPress plugin contains a stored cross‑site scripting flaw that allows a malicious user to submit arbitrary JavaScript through the wpr_admin_msg parameter. Because the input is stored without proper sanitization or escaping, the injected script is later rendered in the browser of any visitor who views a page that displays the message. Falling under CWE‑79, this flaw enables an attacker to run code in the context of the site.

Affected Systems

The vulnerability affects the Simple User Registration plugin released by nmedia, in every version up to and including 6.6. Any WordPress installation that has installed one of those releases is vulnerable unless the plugin has been upgraded to a fixed version.

Risk and Exploitability

With a CVSS score of 7.2 the flaw is of moderate severity, and the EPSS score of less than 1 % indicates a low probability of exploitation. An unauthenticated attacker can inject arbitrary JavaScript via the wpr_admin_msg parameter, which is stored without sanitization or escaping and later rendered when a page displaying the message is viewed. Based on the description, it is inferred that the execution of the injected JavaScript could compromise the confidentiality, integrity or availability of site visitors. The vulnerability is not listed in the CISA KEV catalog, but based on the description it is inferred that it can affect all visitors to an affected site, making it a significant risk.

Generated by OpenCVE AI on April 22, 2026 at 13:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple User Registration plugin to version 6.7 or later, which removes the vulnerable wpr_admin_msg parameter.
  • If an upgrade is delayed, disable or delete the wpr_admin_msg functionality or restrict its use so that only authenticated administrators can submit messages.
  • Implement a Content Security Policy that blocks inline scripts and restricts allowed script sources to trusted domains to prevent execution of any injected JavaScript.

Generated by OpenCVE AI on April 22, 2026 at 13:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared N-media
N-media simple User Registration
Wordpress
Wordpress wordpress
Vendors & Products N-media
N-media simple User Registration
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
Description The Simple User Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpr_admin_msg' parameter in all versions up to, and including, 6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Simple User Registration <= 6.6 - Unauthenticated Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

N-media Simple User Registration
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:17.936Z

Reserved: 2025-10-24T13:24:29.288Z

Link: CVE-2025-12160

cve-icon Vulnrichment

Updated: 2025-11-21T14:44:06.267Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T10:15:47.910

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12160

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:00:18Z

Weaknesses