Impact
The Like DisLike Voting plugin for WordPress is vulnerable to Reflected Cross‑Site Scripting due to the use of the unescaped $SERVER['PHP_SELF'] variable. A malicious user can inject arbitrary JavaScript into a page that is displayed when another user follows a crafted link. This allows the attacker to execute code in the victim’s browser, which can lead to theft of session cookies, defacement of the site, or malicious redirects, thereby compromising the confidentiality and integrity of user data.
Affected Systems
All installations of the Like DisLike Voting plugin from vendor wasiul99 that use version 1.0.1 or earlier are affected. This includes any WordPress site that has not upgraded beyond these releases.
Risk and Exploitability
The CVSS score of 6.1 indicates a moderate severity, and the EPSS score of less than 1 % suggests a low probability of automated exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger it remotely by tricking a user into visiting a specially crafted URL; no authentication or elevated privileges are required. The impact is limited to the surface area of the victim’s browser session, but widespread, unsanitized cross‑site scripting can disrupt user experience and erode trust.
OpenCVE Enrichment