Impact
The Testimonial Master plugin for WordPress contains a reflected cross‑site scripting flaw that occurs when the value of the $_SERVER['PHP_SELF'] variable is output without proper escaping. An unauthenticated attacker can inject arbitrary JavaScript by crafting a malicious URL that, when a victim follows it, embeds the script into the page. This can lead to phishing, credential theft, or site defacement in the victim’s browser.
Affected Systems
The vendor fpcorso provides the Testimonial Master plugin for WordPress. All releases up to and including version 0.2.1 contain the vulnerability; no patched release is available in the data. Users who have not upgraded beyond 0.2.1 are at risk.
Risk and Exploitability
The CVSS score of 6.1 denotes medium severity. The EPSS score of less than 1 % indicates a very low probability of exploitation in the wild at this time, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote and requires no authentication; an attacker only needs to send a crafted link or embed the URL in phishing content to exploit the flaw.
OpenCVE Enrichment