Description
The CryoKey plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘ckemail’ parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-03-22
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Patch Plugin
AI Analysis

Impact

The CryoKey plugin for WordPress contains a reflected cross‑site scripting vulnerability in the 'ckemail' parameter due to insufficient input sanitization and output escaping. An unauthenticated attacker can embed arbitrary JavaScript into a crafted URL, which will execute in the victim’s browser if the user clicks the link. While the flaw does not grant direct code execution or administrative privileges, it allows attackers to steal session cookies, deface content, or load malicious payloads, thereby compromising user confidentiality and integrity.

Affected Systems

This vulnerability affects the CryoKey plugin for WordPress, specifically all releases up to and including version 2.4. Systems running these plugin versions, regardless of the host WordPress installation, are susceptible to the flaw.

Risk and Exploitability

The CVSS score of 4.7 categorizes the issue as low to moderate severity, and an EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, reflecting its limited exposure. Attackers can exploit the flaw without authentication, but the vector requires social engineering: a malicious link must be clicked by a user who has access to a page that passes the 'ckemail' value to the vulnerable plugin. An attacker could hijack sessions, deliver malware, or compromise user accounts, but the attack is limited to the browsers that load the compromised content.

Generated by OpenCVE AI on April 22, 2026 at 17:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the CryoKey plugin to version 2.5 or later, which removes the vulnerability by sanitizing the 'ckemail' parameter.
  • If an immediate upgrade is not possible, implement input validation that restricts the 'ckemail' parameter to a properly formatted email address and strip any script tags before processing.
  • Add a Content Security Policy that disallows inline JavaScript and restricts script sources to trusted origins, providing a secondary defense against XSS payloads.

Generated by OpenCVE AI on April 22, 2026 at 17:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7188 The CryoKey plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘ckemail’ parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Mon, 24 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
Description The CryoKey plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘ckemail’ parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title CryoKey <= 2.4 - Reflected Cross-Site Scripting via 'ckemail' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:07.508Z

Reserved: 2025-03-17T21:17:09.212Z

Link: CVE-2025-2477

cve-icon Vulnrichment

Updated: 2025-03-24T14:51:45.467Z

cve-icon NVD

Status : Deferred

Published: 2025-03-22T07:15:24.780

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2477

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T17:45:22Z

Weaknesses