Impact
The WP Directory Kit plugin for WordPress contains an input handling flaw in the order_by query parameter that is not properly sanitized or escaped when rendering the page. This flaw enables an unauthenticated attacker to craft a request that includes JavaScript code, causing that code to be reflected back to the visitor's browser when the page loads. An injected script can then perform actions such as stealing session cookies, defacing the site, or redirecting users to malicious destinations.
Affected Systems
The flaw exists in all releases of the WP Directory Kit WordPress plugin from its earliest versions through 1.4.5 inclusive. Any WordPress installation that has the plugin installed and active below 1.4.6 is vulnerable. Sites using a newer version or that have removed the plugin are not affected.
Risk and Exploitability
The CVSS score for this vulnerability is 6.1, indicating a medium severity. The EPSS score is reported as less than 1%, suggesting a very low probability of observed exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to entice a user to visit a crafted URL, a typical XSS attack vector. While the impact does not compromise the server itself, it can lead to credential theft or defacement, posing a significant risk to site owners and visitors.
OpenCVE Enrichment