Description
The GitHub Gist Shortcode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter of the 'gist' shortcode in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-11
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that permits arbitrary script execution in the browsers of users who view pages containing the injected content.
Action: Immediate Patch
AI Analysis

Impact

The WordPress GitHub Gist Shortcode Plugin contains a stored XSS flaw in the 'id' parameter of the 'gist' shortcode. Because the plugin fails to sanitize or escape this input, an authenticated user with Contributor‑level or higher privileges can insert malicious JavaScript. When any visitor opens a post or page that displays the compromised gist, the injected code runs in their browser, potentially allowing credential theft, session hijacking, defacement or other client‑side attacks. This vulnerability is a classic injection of client‑side code that compromises confidentiality and integrity of user sessions.

Affected Systems

The affected product is the GitHub Gist Shortcode Plugin for WordPress, developed by paul1999. Versions up to and including 0.2 are affected; newer releases are not vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 6.4, indicating a medium severity impact. The EPSS score is less than 1 %, suggesting a very low probability of exploitation at the time of analysis, and it is not listed in the CISA KEV catalog. Attackers must first be authenticated with Contributor or higher privileges, then they can embed malicious code through the shortcode; once injected, the script executes on users who view the page. The vulnerability can be exploited over the web via the WordPress administrative interface by adding or editing a post that includes the problematic shortcode.

Generated by OpenCVE AI on April 21, 2026 at 01:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the GitHub Gist Shortcode Plugin to the latest version, which removes the XSS vulnerability.
  • If an upgrade is not immediately possible, disable or remove the plugin until a patched version is available.
  • Ensure that users with Contributor or higher roles are aware they cannot add arbitrary scripts via the gist shortcode; consider enforcing stricter role permissions if the site requires it.

Generated by OpenCVE AI on April 21, 2026 at 01:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 14 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Paul1999
Paul1999 github Gist Shortcode Plugin
Wordpress
Wordpress wordpress
Vendors & Products Paul1999
Paul1999 github Gist Shortcode Plugin
Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The GitHub Gist Shortcode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter of the 'gist' shortcode in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title GitHub Gist Shortcode Plugin <= 0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Paul1999 Github Gist Shortcode Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:43.744Z

Reserved: 2025-11-03T21:30:51.091Z

Link: CVE-2025-12667

cve-icon Vulnrichment

Updated: 2025-11-14T15:20:50.562Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T04:15:49.260

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12667

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:45:24Z

Weaknesses