Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in lampd Call To Action Popup call-to-action-popup allows Reflected XSS.This issue affects Call To Action Popup: from n/a through <= 1.0.2.
Published: 2025-01-22
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Call To Action Popup plugin contains a reflected XSS flaw that allows evaluators to inject JavaScript into the page rendered for the user. The vulnerability stems from improper neutralization of user input in dynamic page content. If successfully exploited, an attacker could run arbitrary scripts in the victim's browser, potentially stealing session cookies, redirecting users to phishing sites, or hijacking user accounts. This directly jeopardizes confidentiality and integrity of user data and may facilitate credential theft or malicious account takeover. The flaw resides in the plugin’s handling of parameters that are reflected back in web page output without adequate escaping. It does not grant code execution on the server or alter server‑side data; the impact is confined to the client side via the victim’s browser. Because the vulnerability is client‑side, it requires a victim to click a crafted link or view a malicious page that includes the exploit. Such attacks can be carried out over the public internet, but the overall risk is tempered by the low likelihood of exploitation as reflected in the EPSS metric.

Affected Systems

WordPress users running the lampd Call To Action Popup plugin version 1.0.2 or earlier are affected. The issue is present across all supported versions up to and including 1.0.2. There are no noted exceptions or vendor‑specific mitigations.

Risk and Exploitability

The CVSS score of 7.1 indicates high severity, but the EPSS score of less than 1% shows that the probability of exploitation is very low at present. The vulnerability is not listed in the CISA KEV catalog. Attack is likely to occur via crafted URLs or form inputs that include malicious scripts, which are reflected back to the victim’s browser. Successful execution requires the victim to be tricked into loading the malicious input.

Generated by OpenCVE AI on May 2, 2026 at 05:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Call To Action Popup plugin to the latest available version that addresses the XSS flaw.
  • If an update is not available, disable the plugin until the fix is applied to eliminate the attack surface.
  • Configure a web application firewall or use a Content Security Policy that blocks injection of unknown scripts as an interim countermeasure.

Generated by OpenCVE AI on May 2, 2026 at 05:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3280 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LamPD Call To Action Popup allows Reflected XSS. This issue affects Call To Action Popup: from n/a through 1.0.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LamPD Call To Action Popup allows Reflected XSS. This issue affects Call To Action Popup: from n/a through 1.0.2. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in lampd Call To Action Popup call-to-action-popup allows Reflected XSS.This issue affects Call To Action Popup: from n/a through <= 1.0.2.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 22 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Jan 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LamPD Call To Action Popup allows Reflected XSS. This issue affects Call To Action Popup: from n/a through 1.0.2.
Title WordPress Call To Action Popup plugin <= 1.0.2 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-11T23:05:55.186Z

Reserved: 2025-01-16T11:27:03.857Z

Link: CVE-2025-23605

cve-icon Vulnrichment

Updated: 2025-01-22T16:16:48.899Z

cve-icon NVD

Status : Deferred

Published: 2025-01-22T15:15:18.937

Modified: 2026-04-23T15:24:08.083

Link: CVE-2025-23605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T06:00:13Z

Weaknesses