Impact
The rng-refresh WordPress plugin contains an improper neutralization of input during web page generation, enabling attackers to inject malicious scripts into the reflected response.
Affected Systems
The flaw affects the rng‑refresh plugin distributed by Abolfazl Sabagh for WordPress sites, specifically all releases up to and including version 1.0. WordPress installations that have not upgraded beyond 1.0 are susceptible.
Risk and Exploitability
The CVSS base score of 7.1 indicates moderate to high severity. The EPSS score of less than 1% suggests a low probability of widespread exploitation at present, and the vulnerability is not currently listed in CISA's KEV catalog. An attacker can exploit the reflected XSS by sending malicious input that the plugin returns unfiltered, which requires a vulnerable instance and user interaction to trigger.
OpenCVE Enrichment
EUVD