Description
The NewStatPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a regex bypass in nsp_shortcode function in all versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-12
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch immediately
AI Analysis

Impact

The NewStatPress WordPress plugin contains a stored cross‑site scripting flaw that is triggered by a regular expression bypass in the nsp_shortcode function. Unsanitized, user‑supplied attributes are stored and later rendered without proper escaping, allowing an attacker to inject arbitrary JavaScript into page content. When a victim page is viewed, the injected script executes in the victim’s browser with the privileges of the page, enabling session hijacking, data theft, or defacement. The weakness is identified as CWE‑79 and grants attackers the ability to run code within the context of the site’s users.

Affected Systems

WordPress installations using the NewStatPress plugin, any release up to and including version 1.4.3. The vulnerability affects all users who have contributed content or higher roles that interact with the plugin’s shortcode functionality.

Risk and Exploitability

The CVSS score of 6.4 places this issue in the moderate category, while the EPSS score of less than 1% indicates a low probability of active exploitation. The attack requires authenticated access with at least contributor privileges and is limited to the scope of pages that employ the affected shortcode. The lack of a KEV listing suggests that mass exploitation has not been observed yet, but the medium severity and the need for legitimate WordPress permissions mean the flaw should still be treated with priority.

Generated by OpenCVE AI on April 20, 2026 at 21:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the NewStatPress plugin to a version later than 1.4.3.
  • Adjust WordPress user roles so that contributors cannot insert the vulnerable shortcode or content that triggers it.
  • Audit existing posts and pages for stored script payloads and remove any malicious code that may have been injected.

Generated by OpenCVE AI on April 20, 2026 at 21:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000


Thu, 18 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The NewStatPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a regex bypass in nsp_shortcode function in all versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title NewStatPress <= 1.4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:30:27.170Z

Reserved: 2025-11-26T15:20:39.095Z

Link: CVE-2025-13747

cve-icon Vulnrichment

Updated: 2025-12-18T20:37:57.832Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T04:15:42.157

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13747

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:30:18Z

Weaknesses