Description
The Post Like Dislike plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-01-07
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Update Plugin
AI Analysis

Impact

The Post Like Dislike plugin contains a reflected Cross‑Site Scripting flaw that allows an attacker to inject malicious JavaScript into pages served by the plugin. The flaw originates from unsanitized and unescaped use of the $_SERVER['PHP_SELF'] variable. When a crafted URL containing a payload is visited, the script is executed in the victim's browser, enabling attackers to steal session data, deface content, or perform phishing attacks. This vulnerability is classified as CWE‑79.

Affected Systems

The vulnerability affects the WordPress plugin "Post Like Dislike" from vendor cuvixsystem. All released versions up to and including 1.0 are impacted; newer releases beyond 1.0 are presumed patched. Sites running the plugin are at risk regardless of user privileges, since unauthenticated users can trigger the XSS by visiting a malicious link.

Risk and Exploitability

The CVSS base score is 6.1, indicating a medium level of severity. The exploit probability according to EPSS is below 1 %, suggesting that the flaw is rarely targeted in the wild. It is not listed in CISA’s KEV catalog. Successful exploitation requires an attacker to embed a malicious script into a URL that the victim follows, which typically demands social‑engineering or a malicious advertisement. Because the vulnerability is reflected, no local state is altered and the impact is limited to the victim’s browser session.

Generated by OpenCVE AI on April 21, 2026 at 16:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Post Like Dislike to the latest version that implements proper input sanitization and output escaping.
  • If an update is not yet available, disable or uninstall the plugin to remove the attack surface.
  • For temporary protection, replace the unsanitized $_SERVER['PHP_SELF'] usage with a safe function such as wp_unslash or sanitize_text_field before outputting it.

Generated by OpenCVE AI on April 21, 2026 at 16:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description The Post Like Dislike plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Post Like Dislike <= 1.0 - Reflected Cross-Site Scripting via $_SERVER['PHP_SELF']
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:54:50.152Z

Reserved: 2025-12-05T17:03:54.463Z

Link: CVE-2025-14130

cve-icon Vulnrichment

Updated: 2026-01-07T14:59:11.496Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:53.663

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14130

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:45:15Z

Weaknesses