Impact
The WP Project Manager plugin for WordPress contains a stored XSS flaw caused by inadequate sanitization and escaping of SVG files. An authenticated user with Author privileges or higher can upload a malicious SVG; when any user opens that file, the browser executes the injected script, potentially allowing the attacker to deface the site, hijack sessions or exfiltrate data. The weakness is a classic input validation flaw (CWE‑79).
Affected Systems
All installations of the WP Project Manager plugin from developers Wedevs, specifically versions 2.6.22 and older, run on WordPress sites. The plugin provides AI‑powered project, task, Kanban and time‑tracking features.
Risk and Exploitability
The CVSS v3.1 base score is 6.4, reflecting a medium severity due to the requirement of authenticated author access and the impact on integrity, confidentiality and availability. The EPSS score is below 1 %, indicating a low but non‑zero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need user privileges to upload a malicious SVG, after which the malicious code runs in the browsers of any user who views the file. A dedicated exploit is unlikely due to the narrow prerequisites, but organizations using known vulnerable versions should prioritize the fix.
OpenCVE Enrichment
EUVD