Description
The Page Keys plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘page_key’ parameter in all versions up to, and including, 1.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2026-01-07
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The Page Keys WordPress plugin contains a stored cross‑site scripting flaw in the page_key parameter that allows any authenticated user with administrator privileges to inject arbitrary JavaScript into pages. When a user visits an affected page, the injected script executes in the victim’s browser, enabling actions such as cookie theft, session hijacking, phishing, or defacement. Because the payload is stored, the vulnerability affects every subsequent view of the modified page by any user, posing a risk to confidentiality, integrity, and availability of the site’s content.

Affected Systems

The vulnerability exists in the Page Keys plugin from tfrommen, versions up to and including 1.3.3. It is relevant for WordPress multi‑site installations where the unfiltered_html capability is disabled and an administrator has access to modify page keys.

Risk and Exploitability

The CVSS score of 4.4 indicates a moderate severity, while the EPSS score of less than 1% shows a very low probability of exploitation today. The flaw is not listed in the CISA KEV catalog. An attacker must first gain administrator access before exploiting the stored XSS; the attack vector is therefore a local privilege escalation confined to the WordPress site. Once the attacker injects code, any visitor to the affected page becomes vulnerable to the script’s effects.

Generated by OpenCVE AI on April 22, 2026 at 15:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Page Keys plugin to version 1.3.4 or later.
  • Audit existing page content for injected scripts and remove any malicious code.
  • Configure WordPress to restrict unfiltered_html for administrators or revert to filtered content if feasible.

Generated by OpenCVE AI on April 22, 2026 at 15:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:00:00 +0000


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Page Keys plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘page_key’ parameter in all versions up to, and including, 1.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Page Keys <= 1.3.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'page_key' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:07.042Z

Reserved: 2025-12-20T17:54:15.651Z

Link: CVE-2025-15000

cve-icon Vulnrichment

Updated: 2026-01-07T14:47:29.409Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:58.390

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-15000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:00:12Z

Weaknesses