Description
The Attachments Handler plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-12-20
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Attachments Handler plugin contains a reflected Cross‑Site Scripting vulnerability that is triggered by an attacker‑controlled URL. The flaw stems from insufficient input sanitization and a lack of output escaping, allowing arbitrary scripts to be injected into pages rendered for the victim. If a user is tricked into visiting a crafted link, the script executes in their browser session. Based on typical XSS effects, it could facilitate cookie theft, session hijacking, or malicious site navigation, but the extent depends on the site context.

Affected Systems

The vulnerability affects all versions of the kaizencoders Attachments Handler plugin through 1.1.7, which is available on WordPress sites. Users running these versions, especially those that expose the Admin Table interface or provide direct links to attachments, are at risk.

Risk and Exploitability

The CVSS score of 6.1 places this flaw in the moderate severity range, and the EPSS score of less than 1 % indicates a low likelihood of exploitation. It is not yet listed in CISA’s KEV catalog. Attackers would need to lure a user to click on a maliciously crafted URL, making social engineering a prerequisite for exploitation. No authentication is required; an unauthenticated user can create the malicious link.

Generated by OpenCVE AI on April 21, 2026 at 16:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Attachments Handler to the latest stable release when it is made available, ensuring it includes the fix for the reflected XSS flaw. Investigate the plugin vendor’s website or update channels for a patch that addresses this vulnerability and apply it promptly.
  • If the plugin is not required, remove or disable it completely to eliminate the attack surface.
  • For sites that must retain the plugin, conduct a code audit of any customizations that involve URL generation or output rendering to ensure proper input validation and escaping are in place.

Generated by OpenCVE AI on April 21, 2026 at 16:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 22 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 20 Dec 2025 03:30:00 +0000

Type Values Removed Values Added
Description The Attachments Handler plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Attachments Handler <= 1.1.7 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:27:51.356Z

Reserved: 2025-10-31T21:26:03.059Z

Link: CVE-2025-12581

cve-icon Vulnrichment

Updated: 2025-12-22T20:29:23.844Z

cve-icon NVD

Status : Deferred

Published: 2025-12-20T04:16:06.093

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12581

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:00:12Z

Weaknesses