Description
The Nonaki – Drag and Drop Email Template builder and Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'nonaki' shortcode in all versions up to, and including, 1.0.11. This is due to insufficient input sanitization and output escaping on user supplied custom field values that are retrieved and rendered by the shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-11
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting allowing arbitrary script injection
Action: Patch Immediately
AI Analysis

Impact

The Nonaki email template builder plugin contains a stored XSS vulnerability that allows authenticated contributors to inject malicious scripts via custom field values rendered by the "nonaki" shortcode. The flaw derives from insufficient input filtering and output escaping, enabling arbitrary JavaScript to run in the context of any page that displays the malicious content. Attackers could thus perform session hijacking, defacement, or phishing within affected sites.

Affected Systems

All installations of the Nonaki – Drag and Drop Email Template builder and Newsletter plugin for WordPress up to and including version 1.0.11 are vulnerable. WordPress sites that have granted contributors or higher roles the ability to create or edit these templates are at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, while the EPSS score of <1% suggests that exploitation probability remains low but nonzero. The vulnerability is not listed in CISA's KEV catalog. An attacker must first authenticate with at least contributor privileges, after which they can inject scripts that will execute for any visitor accessing the infected page. Because the flaw is stored and triggered simply by page view, once compromised, the impact can affect all site users.

Generated by OpenCVE AI on April 21, 2026 at 18:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Nonaki plugin to the latest stable release that includes the XSS mitigation, or apply any vendor‑supplied patch.
  • Remove any custom field entries that contain untrusted or potentially malicious content, and review the stored data for injected scripts.
  • Limit contributor role privileges or verify that only trusted users have permission to insert or edit email templates, enforcing stricter role management.

Generated by OpenCVE AI on April 21, 2026 at 18:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 12 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Nonaki – Drag and Drop Email Template builder and Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'nonaki' shortcode in all versions up to, and including, 1.0.11. This is due to insufficient input sanitization and output escaping on user supplied custom field values that are retrieved and rendered by the shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Nonaki – Drag and Drop Email Template builder and Newsletter plugin for WordPress <= 1.0.11 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Fields
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:49.417Z

Reserved: 2025-11-03T19:43:47.466Z

Link: CVE-2025-12644

cve-icon Vulnrichment

Updated: 2025-11-12T16:34:20.338Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T04:15:48.050

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12644

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses