Description
The MG AdvancedOptions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-01-09
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The MG AdvancedOptions plugin for WordPress is vulnerable to reflected cross‑site scripting because it fails to sanitize and escape the $_SERVER['PHP_SELF'] variable in all releases up to 1.2. An unauthenticated attacker can insert arbitrary JavaScript that runs in the victim’s browser when they visit a specially crafted URL or link. The consequence is that the attacker can run code in the context of the victim’s session; the impact is client‑side and does not affect the server.

Affected Systems

The vulnerability affects the Mountaingrafix MG AdvancedOptions plugin on WordPress, specifically all versions through and including 1.2. No later versions are noted as affected, and no additional vendors were listed.

Risk and Exploitability

The reported CVSS score of 6.1 indicates medium severity. EPSS <1% shows a very low probability of exploitation, and it is not listed in the CISA KEV catalog. An attacker can craft a URL or link that, when followed by an unauthenticated user, triggers execution of injected scripts. No authentication or privileged access is required.

Generated by OpenCVE AI on April 21, 2026 at 23:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MG AdvancedOptions plugin to a version later than 1.2 where the PHP_SELF handling is properly sanitized
  • If no newer version is available, remove or replace the PHP_SELF reference in any custom code with a safe alternative and ensure output is escaped
  • Configure a content‑security‑policy header to restrict script execution sources and mitigate the impact of any residual reflected XSS

Generated by OpenCVE AI on April 21, 2026 at 23:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Mountaingrafix
Mountaingrafix mg Advancedoptions
Wordpress
Wordpress wordpress
Vendors & Products Mountaingrafix
Mountaingrafix mg Advancedoptions
Wordpress
Wordpress wordpress

Fri, 09 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
Description The MG AdvancedOptions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title MG AdvancedOptions <= 1.2 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Mountaingrafix Mg Advancedoptions
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:44.665Z

Reserved: 2025-12-02T15:36:54.355Z

Link: CVE-2025-13892

cve-icon Vulnrichment

Updated: 2026-01-09T17:53:42.552Z

cve-icon NVD

Status : Deferred

Published: 2026-01-09T12:15:52.347

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:00:03Z

Weaknesses