Description
The SMS for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'paged' parameter in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-11-05
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The SMS for WordPress plugin contains a reflected XSS flaw caused by insufficient sanitization of the paged parameter. The flaw allows an unauthenticated attacker to embed arbitrary JavaScript that is reflected back into the page when the parameter is displayed. The injected script runs in the victim’s browser, enabling any browser‑based action permitted by the victim's session, such as session hijacking, phishing, or defacement. The vulnerability is classified as CWE‑79.

Affected Systems

The vulnerability affects all releases of the SMS for WordPress plugin by Stanley Choi up to and including version 1.1.8. No other vendors or products are listed as impacted in the CNA data, so the scope is limited to this plugin only.

Risk and Exploitability

The CVSS score of 6.1 denotes a medium severity. An EPSS score of less than 1% indicates a low likelihood of exploitation at the moment, and the issue is not in the CISA KEV catalog. Based on the description, it is inferred that exploitation requires a crafted URL that contains malicious JavaScript within the paged parameter. No authentication is required, and the malicious code is executed client‑side when a user opens the affected URL. The attacker can then perform any action that the victim’s browser permits, potentially compromising confidentiality, integrity, or availability of the site from the victim’s perspective.

Generated by OpenCVE AI on April 22, 2026 at 03:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SMS for WordPress plugin to a version newer than 1.1.8.
  • If an upgrade cannot be performed immediately, restrict the paged parameter to numeric input only and ensure that any output containing this value is properly escaped before rendering.
  • Deploy a web application firewall rule that detects and blocks malicious scripts injected through the paged parameter to mitigate exploitation.

Generated by OpenCVE AI on April 22, 2026 at 03:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 07 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Stanleychoi
Stanleychoi sms For Wordpress
Wordpress
Wordpress wordpress
Vendors & Products Stanleychoi
Stanleychoi sms For Wordpress
Wordpress
Wordpress wordpress

Wed, 05 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The SMS for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'paged' parameter in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title SMS for WordPress <= 1.1.8 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Stanleychoi Sms For Wordpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:56.095Z

Reserved: 2025-10-31T21:23:24.376Z

Link: CVE-2025-12580

cve-icon Vulnrichment

Updated: 2025-11-05T14:20:21.766Z

cve-icon NVD

Status : Deferred

Published: 2025-11-05T04:15:33.040

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12580

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:00:08Z

Weaknesses