Description
The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Roundup Recipe Name field in all versions up to, and including, 9.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-03-13
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via the Roundup Recipe Name field
Action: Immediate Patch
AI Analysis

Impact

The WP Recipe Maker plugin contains a stored cross‑site scripting flaw in the Roundup Recipe Name field. Because the input is neither sanitized nor properly escaped, attackers with Contributor‑level or higher privileges can place arbitrary JavaScript in recipe pages. When a user opens the affected page, the injected script runs in the victim’s browser, enabling credential theft, session hijacking, or other client‑side attacks. The vulnerability directly compromises the integrity of web content and the confidentiality of user sessions.

Affected Systems

All installations of WP Recipe Maker by brechtvds up to and including version 9.8.0 are affected. The flaw exists in every release within that range of the plugin.

Risk and Exploitability

With a CVSS score of 6.4, the vulnerability is rated medium severity. The EPSS score of <1% indicates a very low probability of exploitation in the wild at this time, and the issue is not listed in the CISA KEV catalog. However, the requirement for authenticated Contributor access means that anyone with those privileges can execute the XSS payload, so site administrators must assess whether such credentials are granted broadly.

Generated by OpenCVE AI on April 21, 2026 at 21:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP Recipe Maker to the latest available version (any release newer than 9.8.0) to eliminate the vulnerability.
  • If an immediate update is not feasible, restrict or remove Contributor role access on the site to prevent the injection of malicious scripts.
  • As a temporary workaround, disable the Roundup Recipe Name field in recipe editing or replace the plugin with a non‑vulnerable alternative until a patch can be applied.

Generated by OpenCVE AI on April 21, 2026 at 21:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6615 The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Roundup Recipe Name field in all versions up to, and including, 9.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00038}

epss

{'score': 0.00049}


Mon, 17 Mar 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Mar 2025 04:30:00 +0000

Type Values Removed Values Added
Description The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Roundup Recipe Name field in all versions up to, and including, 9.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WP Recipe Maker <= 9.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:09.128Z

Reserved: 2025-02-20T18:29:57.105Z

Link: CVE-2025-1503

cve-icon Vulnrichment

Updated: 2025-03-17T21:25:34.558Z

cve-icon NVD

Status : Deferred

Published: 2025-03-13T05:15:24.917

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-1503

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses