Description
The Overstock Affiliate Links plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-12-20
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting that can be triggered by unauthenticated users
Action: Apply Patch
AI Analysis

Impact

An attacker can exploit a reflected Cross‑Site Scripting flaw in the Overstock Affiliate Links plugin. The vulnerability originates from the use of the $_SERVER['PHP_SELF'] variable without proper sanitization or escaping. Because the data is reflected back in an HTML context, any string supplied in the URL can become executable JavaScript during page rendering. Attackers can therefore embed malicious scripts that run in the context of any user who visits the crafted link, potentially stealing session cookies, credentials, or performing actions on behalf of the victim.

Affected Systems

The affected software is the Overstock Affiliate Links plugin for WordPress, distributed by travishoki. All releases with a version number up to and including 1.1 are vulnerable. WordPress users who are still operating the plugin at these versions are at risk. No earlier release is listed as a fix; users should upgrade once a patched release becomes available.

Risk and Exploitability

The CVSS score of 6.1 indicates medium severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the broader community, and the vulnerability is not currently listed in CISA's KEV catalog. Nonetheless, the flaw is exploitable by unauthenticated actors who can simply craft a malicious URL that browsers will interpret as a script. An attacker only needs to lure a user (e.g., through phishing or social engineering) to click on a link; no administrator credentials or special configuration are required. If successful, the injected script executes with the privileges of the visiting user, enabling data theft or other malicious actions.

Generated by OpenCVE AI on April 21, 2026 at 00:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Overstock Affiliate Links plugin to the latest available version (recommended 1.2 or newer) to remove the vulnerable code.
  • If an upgrade is not immediately possible, disable the plugin or delete the sandbox_page.php file that references $_SERVER['PHP_SELF'] to prevent the vulnerable variable from being processed.
  • Ensure that any custom PHP code on the site adopts proper output escaping (e.g., htmlspecialchars) when echoing user‑supplied values to mitigate similar risks.

Generated by OpenCVE AI on April 21, 2026 at 00:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 22 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Travishoki
Travishoki overstock Affiliate Links
Wordpress
Wordpress wordpress
Vendors & Products Travishoki
Travishoki overstock Affiliate Links
Wordpress
Wordpress wordpress

Sat, 20 Dec 2025 03:30:00 +0000

Type Values Removed Values Added
Description The Overstock Affiliate Links plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Overstock Affiliate Links <= 1.1 - Reflected Cross-Site Scripting via $_SERVER['PHP_SELF']
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Travishoki Overstock Affiliate Links
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:19:37.745Z

Reserved: 2025-11-24T21:14:07.430Z

Link: CVE-2025-13624

cve-icon Vulnrichment

Updated: 2025-12-22T20:32:13.990Z

cve-icon NVD

Status : Deferred

Published: 2025-12-20T04:16:07.527

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13624

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:45:23Z

Weaknesses