Impact
The vulnerability originates from inadequate input sanitization within the Atarim visual collaboration plugin, enabling attackers to embed malicious scripts that are stored in the website’s database and executed during page rendering. This stored XSS flaw can lead to session hijacking, defacement, or the transmission of malware to site visitors. The weakness aligns with CWE‑79.
Affected Systems
Vito Peleg’s Atarim visual collaboration plugin, versions up to and including 4.0.8, installed on WordPress sites.
Risk and Exploitability
The base CVSS score of 7.1 marks it as high severity. The EPSS is below 1 %, implying a low probability of exploitation, and it is not listed in the CISA KEV catalog. The likely attack vector is user input collected by the plugin that is rendered without proper encoding, allowing malicious scripts to be delivered to all site users. Despite the low exploitation probability, the impact on confidentiality, integrity, and availability makes this a serious risk for unpatched systems.
OpenCVE Enrichment
EUVD