Impact
The WP‑Iconics plugin admits stored cross‑site scripting through several parameters of the 'wp_iconics' shortcode in all releases up to 0.0.4. This weakness stems from inadequate input sanitization and output escaping and is classified as CWE‑79. An authenticated user with Contributor privilege or higher can inject arbitrary JavaScript that runs whenever a visitor views an affected page, potentially allowing phishing, credential theft, or defacement of the site.
Affected Systems
The affected component is the WP‑Iconics plugin from vendor mrx3k1, versions 0.0.4 and earlier. No other vendors or products are listed.
Risk and Exploitability
The vulnerability has a CVSS score of 6.4, indicating moderate severity, and an EPSS score of less than 1 %, suggesting a low probability of exploitation in the near term. It is not listed in the CISA KEV catalog. The exploit requires a valid WordPress session with Contributor or higher access, so an attacker must first authenticate to the site before injecting malicious payloads.
OpenCVE Enrichment