Description
The CM FAQ – Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-03-14
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The CM FAQ plugin for WordPress is vulnerable to reflected cross‑site scripting because it uses remove_query_arg without escaping the URL query on all pages that include user input. An attacker can inject arbitrary JavaScript that will execute in the browser of any user who is tricked into clicking a crafted link or visiting a malicious URL. This flaw can be exploited by unauthenticated users and can result in session hijacking, credential theft, defacement, or the deployment of malware on the victim’s machine.

Affected Systems

The vulnerability affects the CM FAQ – Simplify support with an intuitive FAQ management tool plugin developed by creativemindssolutions. All released versions up to and including 1.2.5 are impacted; version 1.2.6 and later contain the fix.

Risk and Exploitability

With a CVSS score of 6.1 and an EPSS score below 1%, the exploitation likelihood is low but non‑zero. The flaw is not listed in the CISA KEV catalog, indicating that no publicly reported exploits are currently tracked. Attackers would need only an unauthenticated link and a victim’s browser to deliver the payload, making the vulnerability exploitable without authentication.

Generated by OpenCVE AI on April 21, 2026 at 21:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the CM FAQ plugin to version 1.2.6 or later.
  • If an upgrade is not immediately possible, restrict access to the pages that use the vulnerable query handling or disable the CM FAQ feature until a patch is applied.
  • Configure a web application firewall or security plugin to block or sanitize injected scripts and monitor for suspicious URLs that may trigger cross‑site scripting attacks.

Generated by OpenCVE AI on April 21, 2026 at 21:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6421 The CM FAQ – Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00132}

epss

{'score': 0.00202}


Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 04:45:00 +0000

Type Values Removed Values Added
Description The CM FAQ – Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title CM FAQ – Simplify support with an intuitive FAQ management tool <= 1.2.5 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:50.722Z

Reserved: 2025-03-10T13:49:38.619Z

Link: CVE-2025-2166

cve-icon Vulnrichment

Updated: 2025-03-14T13:57:41.580Z

cve-icon NVD

Status : Deferred

Published: 2025-03-14T05:15:42.723

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2166

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses