Description
The Shouty plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the shouty shortcode in all versions up to, and including, 0.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-27
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The Shouty plugin for WordPress is vulnerable to stored cross‑site scripting by way of the shortcode’s attributes. Because the plugin fails to sanitize or escape user‑supplied attributes, an attacker with contributor-level or higher access can inject arbitrary JavaScript that is stored in the site content and executed whenever a page containing the shortcode is viewed. This CWE‑79 flaw allows the attacker to acquire session information, deface the site, or redirect users to malicious destinations.

Affected Systems

WordPress installations that have the Shouty plugin version 0.2.1 or earlier. Any site using the shortcodes from this plugin is affected, regardless of the overall WordPress version.

Risk and Exploitability

With a CVSS score of 6.4 the vulnerability presents moderate severity. The EPSS score of less than 1% indicates a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access at the contributor level or higher, and the attacker must insert malicious data via the shortcode. Once injected, the stored script runs for all users who view the affected page, potentially compromising user sessions or data.

Generated by OpenCVE AI on April 22, 2026 at 16:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Shouty plugin to the latest stable release (≥0.2.2) that sanitizes and escapes shortcode attributes.
  • If an upgrade cannot be performed immediately, delete any content that contains untrusted shortcode attributes or temporarily remove the plugin/shortcode to prevent injection.
  • Implement a Content Security Policy that restricts execution of inline scripts to mitigate residual risk until a patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 16:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 28 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 27 Nov 2025 03:00:00 +0000

Type Values Removed Values Added
Description The Shouty plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the shouty shortcode in all versions up to, and including, 0.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Shouty <= 0.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shouty Shortcode Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:03.687Z

Reserved: 2025-11-04T19:41:33.691Z

Link: CVE-2025-12712

cve-icon Vulnrichment

Updated: 2025-11-28T14:39:40.366Z

cve-icon NVD

Status : Deferred

Published: 2025-11-27T03:15:58.110

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12712

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:45:21Z

Weaknesses