Description
The Clik stats plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-12-04
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Clik Stats WordPress plugin contains a reflected cross‑site scripting flaw that is triggered when the raw value of the PHP_SELF server variable is placed in the page without proper sanitization or escaping. When an attacker supplies a crafted value in the URL, the plugin echoes that value back to the browser, allowing the attacker to inject arbitrary JavaScript. The primary impact is that any user who follows the malicious link could have arbitrary code executed in their browser session, potentially leading to credential theft or defacement. This weakness corresponds to CWE‑79 and is characterized by insufficient output encoding.

Affected Systems

The vulnerable component is the Clik Stats plugin distributed by Codejunkie for WordPress. All releases up to and including version 0.8 are affected. Users running any of these plugin versions within a WordPress installation are at risk, regardless of role, because the flaw can be triggered by unauthenticated visitors.

Risk and Exploitability

The CVSS score of 6.1 places the vulnerability in the Medium severity range, indicating a reasonable but not extreme risk. The EPSS score of less than 1% suggests a very low probability of widespread exploitation at present, and the flaw is not listed in the CISA KEV catalog. The typical attack path requires the attacker to lure a user to a URL that contains the malicious payload; this is a social‑engineering scenario common to reflected XSS. Once the victim clicks the link or navigates to the crafted page, the injected script runs with the privileges of the victim’s browser session.

Generated by OpenCVE AI on April 21, 2026 at 17:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Clik Stats plugin to the latest released version (any build newer than 0.8) to eliminate the PHP_SELF echo flaw.
  • If an upgrade is not possible immediately, remove the plugin entirely or ensure that the site is not publicly accessible to untrusted users until the fix is applied.
  • Implement a robust Content Security Policy that blocks inline scripts and restricts script sources to prevent execution of injected code while a permanent code fix is pending.

Generated by OpenCVE AI on April 21, 2026 at 17:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 04 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 04 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 04 Dec 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Clik stats plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Clik stats <= 0.8 - Reflected Cross-Site Scripting via $_SERVER['PHP_SELF']
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:37.051Z

Reserved: 2025-11-21T18:30:30.441Z

Link: CVE-2025-13513

cve-icon Vulnrichment

Updated: 2025-12-04T14:42:40.883Z

cve-icon NVD

Status : Deferred

Published: 2025-12-04T06:15:47.797

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13513

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:00:11Z

Weaknesses