Description
The Telegram Bot & Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Telegram username in all versions up to, and including, 4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-25
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the Telegram Bot & Channel plugin for WordPress, where the Telegram username field is insufficiently sanitized before it is stored and later output without proper escaping. This flaw allows an attacker who does not need authentication to embed arbitrary client‑side scripts that will run when any user views a page containing the injected username. The result is typical XSS abuse: session hijacking, credential theft, defacement or execution of malicious payloads in the context of the visiting user. The weakness is cataloged as CWE‑79, a classic unvalidated input scenario leading to script injection.

Affected Systems

Any WordPress site that installed the Telegram Bot & Channel plugin in any version up to and including 4.1 is affected. The plugin is maintained by the milmor vendor within the WordPress ecosystem.

Risk and Exploitability

The CVSS score of 7.2 signifies high potential impact, yet the EPSS score of less than 1% indicates that the likelihood of exploitation remains low at this time. The vulnerability is not listed in CISA KEV, suggesting no known large‑scale exploit activity. Attackers can achieve exploitation simply by submitting a malicious username via the plugin interface; no additional credentials or privileged access are required.

Generated by OpenCVE AI on April 21, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Telegram Bot & Channel plugin to the latest available version that has fixed the XSS issue.
  • If an update is unavailable, modify the plugin’s username handler to enforce strict server‑side sanitization and ensure all output is properly escaped before rendering.
  • Consider disabling or removing the ability to set the Telegram username in the plugin if the feature is unnecessary for your deployment.

Generated by OpenCVE AI on April 21, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 27 Nov 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Milmor
Milmor telegram Bot & Channel
Wordpress
Wordpress wordpress
Vendors & Products Milmor
Milmor telegram Bot & Channel
Wordpress
Wordpress wordpress

Tue, 25 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 05:00:00 +0000

Type Values Removed Values Added
Description The Telegram Bot & Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Telegram username in all versions up to, and including, 4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Telegram Bot & Channel <= 4.1 - Unauthenticated Stored Cross-Site Scripting via Telegram Username
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Milmor Telegram Bot & Channel
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:35:08.349Z

Reserved: 2025-11-12T14:03:10.655Z

Link: CVE-2025-13068

cve-icon Vulnrichment

Updated: 2025-11-25T16:58:25.620Z

cve-icon NVD

Status : Deferred

Published: 2025-11-25T05:16:08.830

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13068

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:30:24Z

Weaknesses