Description
The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'notes' and 'resource' parameters in all versions up to, and including, 5.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the Recent Custom Events report.
Published: 2026-01-09
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The SlimStat Analytics plugin for WordPress is vulnerable to stored XSS through the notes and resource parameters. Insufficient input sanitization and output escaping allow an unauthenticated attacker to embed arbitrary JavaScript in the plugin’s data. The injected code is persisted and executed whenever an administrator opens the Recent Custom Events report, potentially compromising the session by delivering client‑side malicious scripts.

Affected Systems

Veron Labs SlimStat Analytics, all releases up to and including version 5.3.4.

Risk and Exploitability

The CVSS score of 7.2 indicates high severity, while the EPSS score of < 1% suggests a low to moderate likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the flaw by sending unauthenticated HTTP requests to the vulnerable endpoints; no authentication or privileged access is required for injection.

Generated by OpenCVE AI on April 21, 2026 at 00:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SlimStat Analytics plugin to the latest available version, or apply any vendor‑supplied patch that addresses the stored XSS flaw.
  • If an upgrade cannot be performed immediately, restrict access to the plugin’s administrative interface so that only authenticated users can load the Recent Custom Events report, and block or filter the notes and resource parameters through server‑side rules or a web application firewall.
  • Apply runtime XSS mitigations such as enforcing strict output escaping for any user‑generated content, attaching a Content Security Policy header to prevent inline script execution, and enabling the X‑XSS‑Protection response header.
  • Consider employing a web application firewall or security plugin to detect and block suspicious JavaScript payloads submitted to the plugin’s endpoints.

Generated by OpenCVE AI on April 21, 2026 at 00:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wp-slimstat
Wp-slimstat slimstat Analytics
Vendors & Products Wordpress
Wordpress wordpress
Wp-slimstat
Wp-slimstat slimstat Analytics

Fri, 09 Jan 2026 06:45:00 +0000

Type Values Removed Values Added
Description The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'notes' and 'resource' parameters in all versions up to, and including, 5.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the Recent Custom Events report.
Title SlimStat Analytics <= 5.3.4 - Unauthenticated Stored Cross-Site Scripting via 'notes/resource' Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wp-slimstat Slimstat Analytics
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:15:39.149Z

Reserved: 2025-12-23T15:41:39.208Z

Link: CVE-2025-15055

cve-icon Vulnrichment

Updated: 2026-01-09T19:10:50.287Z

cve-icon NVD

Status : Deferred

Published: 2026-01-09T07:16:02.313

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-15055

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:30:22Z

Weaknesses