Description
The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘className’ parameter in all versions up to, and including, 5.0.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-01-16
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Reflected XSS)
Action: Patch Now
AI Analysis

Impact

The RSS Aggregator plugin for WordPress allows unauthenticated attackers to inject arbitrary scripts into pages via the className parameter. Because the plugin fails to properly sanitize or escape this input, crafted URLs can deliver malicious JavaScript that executes when a user follows the link. This vulnerability aligns with CWE‑79 and can lead to session hijacking, defacement, or data exfiltration on the victim’s behalf.

Affected Systems

WordPress sites running the RebelCode RSS Aggregator plugin, all versions up to and including 5.0.10. The vulnerability is present in every release within that range.

Risk and Exploitability

The CVSS score is 6.1, indicating a moderate severity. The EPSS score of less than 1 % suggests that exploitation is unlikely under current conditions, and the vulnerability is not listed in the CISA KEV catalog, meaning no publicly documented exploits are known. Attackers would need to entice users to click a malicious link containing a malicious className value; authentication is not required. The low EPSS makes it a modest risk, but XSS can be highly damaging depending on the content served and the value of user data on the target site.

Generated by OpenCVE AI on April 21, 2026 at 23:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the RSS Aggregator plugin to a version that contains the proper input sanitization and output escaping fixes.
  • If an upgrade cannot be performed immediately, deactivate or delete the RSS Aggregator plugin until the patch is applied.
  • As a temporary defense, configure a content‑security‑policy that restricts script execution to trusted origins to mitigate possible XSS effects.

Generated by OpenCVE AI on April 21, 2026 at 23:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Rebelcode
Rebelcode rss Aggregator
Wordpress
Wordpress wordpress
Vendors & Products Rebelcode
Rebelcode rss Aggregator
Wordpress
Wordpress wordpress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 07:30:00 +0000

Type Values Removed Values Added
Description The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘className’ parameter in all versions up to, and including, 5.0.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging <= 5.0.10 - Reflected Cross-Site Scripting via className
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Rebelcode Rss Aggregator
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:38.674Z

Reserved: 2025-12-09T18:52:33.809Z

Link: CVE-2025-14375

cve-icon Vulnrichment

Updated: 2026-01-16T13:48:17.889Z

cve-icon NVD

Status : Deferred

Published: 2026-01-16T08:15:46.050

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14375

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:00:03Z

Weaknesses