Description
The Stylish Order Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'product_name' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-01-07
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting exploited by authenticated users with Subscriber level or higher in the Stylish Order Form Builder plugin
Action: Immediate Patch
AI Analysis

Impact

The vulnerability occurs when the product_name field in the Stylish Order Form Builder plugin is stored without adequate input sanitization or output encoding, allowing attackers with subscriber‑level privileges to embed malicious scripts. The injected code executes in the context of any user who views the affected page, enabling theft of session cookies, defacement, or further exploitation. This is a classic stored XSS flaw (CWE-79).

Affected Systems

This issue affects all releases of the Stylish Order Form Builder plugin by hayyatapps up to and including version 1.0. Versions beyond 1.0 have not been explicitly mentioned as fixed, but may still be impacted if sanitization changes have not been applied. WordPress sites running this plugin at any of these versions are at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity. The EPSS score of less than 1% suggests that actual exploitation is currently rare, and the vulnerability is not listed in the CISA KEV catalog. However, the requirement for only subscriber‑level authentication means that a large portion of site users could perpetrate the attack, increasing the potential impact if compromised credentials exist. Attackers would need to log into the WordPress dashboard, navigate to product management, and submit a crafted product_name string to inject their payload.

Generated by OpenCVE AI on April 22, 2026 at 20:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Stylish Order Form Builder plugin to a version that includes proper input validation and output escaping for the product_name field
  • Revoke or downgrade capabilities of the Subscriber role (or any role affected by the vulnerability) so that only administrators can add or edit products in the plugin
  • Implement site‑wide XSS protection such as a web application firewall or security plugin that sanitizes user input on form submissions, ensuring that any script payload is neutralized before storage

Generated by OpenCVE AI on April 22, 2026 at 20:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Stylish Order Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'product_name' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Stylish Order Form Builder <= 1.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'product_name' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:13.789Z

Reserved: 2025-11-21T20:34:04.049Z

Link: CVE-2025-13531

cve-icon Vulnrichment

Updated: 2026-01-07T14:47:23.074Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:49.247

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13531

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:30:26Z

Weaknesses