Description
The Google Drive upload and download link plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'link' parameter of the 'atachfilegoogle' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-27
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that enables authenticated contributors to inject and execute arbitrary scripts on pages that include the vulnerable shortcode
Action: Patch Plugin
AI Analysis

Impact

The Google Drive upload and download link plugin for WordPress contains a stored cross‑site scripting flaw in the 'link' parameter of the 'atachfilegoogle' shortcode. The lack of proper input sanitization and output escaping allows an authenticated user with Contributor or higher privileges to inject arbitrary JavaScript into pages. When a user later views a page containing the injected content, the script executes in their browser, potentially leading to session hijacking, data theft, or defacement of the site. The CVSS score of 6.4 places the flaw in the medium severity range and the CWE-79 identifier confirms its nature.

Affected Systems

All installations of the oscaruh Google Drive upload and download link WordPress plugin with a version number of 1.0 or earlier are affected. The vulnerability is tied to any WordPress site that utilizes this plugin and allows contributors or higher roles to submit or edit content containing the vulnerable shortcode.

Risk and Exploitability

The exploitation requires the attacker to be an authenticated contributor or higher, but does not need special network-level access. Once the script is stored, any visitor to the affected page will have the malicious code executed in their browser session. The EPSS score of less than 1 % suggests a low probability of exploitation at present, and the flaw is not listed in the CISA KEV catalog. However, because the impact involves arbitrary code execution in the context of site visitors, the risk is considered moderate and should not be ignored.

Generated by OpenCVE AI on April 22, 2026 at 21:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Google Drive upload and download link plugin to the most recent version that patches the sanitization flaw
  • If an update is unavailable, disable the atachfilegoogle shortcode for users with Contributor level or lower and restrict its use to administrators only
  • Consider removing the 'link' field from the shortcode parameters or applying a custom sanitization filter that escapes all output

Generated by OpenCVE AI on April 22, 2026 at 21:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 28 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Oscaruh
Oscaruh google Drive Upload And Download Link
Wordpress
Wordpress wordpress
Vendors & Products Oscaruh
Oscaruh google Drive Upload And Download Link
Wordpress
Wordpress wordpress

Thu, 27 Nov 2025 03:00:00 +0000

Type Values Removed Values Added
Description The Google Drive upload and download link plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'link' parameter of the 'atachfilegoogle' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Google Drive upload and download link <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Oscaruh Google Drive Upload And Download Link
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:53.503Z

Reserved: 2025-11-03T21:29:11.296Z

Link: CVE-2025-12666

cve-icon Vulnrichment

Updated: 2025-11-28T14:39:41.793Z

cve-icon NVD

Status : Deferred

Published: 2025-11-27T03:15:57.733

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:15:27Z

Weaknesses