Impact
The vulnerability allows an authenticated user with Contributor or higher privileges to store malicious code in the Client name and Link meta fields of the Simple Folio plugin. When other site users view a page containing the injected meta data, the stored scripts execute in their browsers. This can lead to session hijacking, phishing, or defacement, compromising confidentiality, integrity, or availability of user sessions.
Affected Systems
WordPress sites running the Simple Folio plugin, versions 1.1.1 and earlier, developed by Presstigers. Any installation of the plugin that has contributor‑level users active is affected.
Risk and Exploitability
The CVSS score of 6.4 indicates moderate severity, and the EPSS score of less than 1% suggests low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Since the exploit requires authenticated access, attackers must first gain Contributor or higher permission on the site. Once logged in, the stored XSS can be inserted and will affect all users who view the affected page.
OpenCVE Enrichment