Description
The Top Position Google Finance plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 0.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-01-09
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

An unauthenticated attacker can exploit the Top Position Google Finance plugin for WordPress through a reflected Cross‑Site Scripting exploit that exploits how the plugin outputs the value of $_SERVER['PHP_SELF'] without proper sanitisation or escaping. The vulnerability allows injection of arbitrary JavaScript code that is sent back to the browser when a victim is tricked into clicking a specially crafted link. This type of flaw can lead to session hijacking, defacement, or the execution of malicious scripts in the context of the authenticated user. The impact is direct compromise of confidentiality, integrity, and availability of the web application for users who interact with the injected content.

Affected Systems

All installations of the Top Position Google Finance WordPress plugin with a version equal to or less than 0.1.0 are impacted. The plugin is distributed by the vendor "Top Position" under the name "Top Position Google Finance" and is referenced by CPE strings for the WordPress plugin ecosystem.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium severity vulnerability, while the EPSS score of less than 1% signals that exploitation in the wild is currently considered unlikely. The vulnerability is not listed in the CISA KEV catalog, further suggesting that public exploitation has not been observed. The attack vector is web‑based: a malicious link that includes crafted query parameters can trick a victim into executing attacker‑supplied JavaScript when the page loads. Successful exploitation requires a user to click the link, but no privileged access or network exploitation is necessary.

Generated by OpenCVE AI on April 20, 2026 at 21:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Top Position Google Finance plugin to the latest version that removes the use of $_SERVER['PHP_SELF'] in output.
  • If an update is not available, disable or delete the plugin until a fix is released.
  • Implement or enforce a Content Security Policy that blocks inline scripts to mitigate the impact of any remaining reflected XSS payloads.

Generated by OpenCVE AI on April 20, 2026 at 21:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Top-position
Top-position google-finance
Wordpress
Wordpress wordpress
Vendors & Products Top-position
Top-position google-finance
Wordpress
Wordpress wordpress

Fri, 09 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description The Top Position Google Finance plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 0.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Top Position Google Finance <= 0.1.0 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Top-position Google-finance
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:51.130Z

Reserved: 2025-12-02T15:40:16.609Z

Link: CVE-2025-13895

cve-icon Vulnrichment

Updated: 2026-01-09T18:01:49.679Z

cve-icon NVD

Status : Deferred

Published: 2026-01-09T10:15:45.943

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13895

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:15:20Z

Weaknesses