Impact
The iONE360 configurator plugin for WordPress suffers from insufficient input sanitization and output escaping in its contact form, allowing unauthenticated attackers to embed arbitrary JavaScript that is stored and later served to users. This stored cross‑site scripting flaw can lead to session hijacking, credential theft, or defacement of pages viewed by unsuspecting visitors. The weakness is classified as CWE‑79.
Affected Systems
All installations of the iONE360 configurator plugin for WordPress with a version of 2.0.57 or earlier are affected. The flaw exists across all releases up to and including 2.0.57.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. An attacker can exploit the flaw by submitting malicious input via the public contact form without any authentication, resulting in scripts being executed for any user who visits the affected page.
OpenCVE Enrichment