Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fastflow Fast Flow fast-flow-dashboard allows Reflected XSS.This issue affects Fast Flow: from n/a through <= 1.2.16.
Published: 2025-02-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Fast Flow plugin for WordPress allows an attacker to inject malicious JavaScript into the page by exploiting improper input neutralization. The vulnerable code reflects user‑supplied data back to the browser without sufficient escaping or validation. When an attacker crafts a malicious payload and lures a victim to the target site, the script runs in the victim's browser, potentially hijacking sessions, stealing cookies, defacing content, or redirecting to malicious sites. The flaw is a classic reflected XSS vulnerability classified as CWE‑79.

Affected Systems

The vulnerability impacts the Fast Flow minified dashboard plugin (fastflow:Fast Flow). All releases from the earliest known version up to and including version 1.2.16 are affected; versions newer than 1.2.16 are not impacted. The product runs on WordPress sites where the plugin is installed.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity, but the EPSS score of < 1% shows a very low likelihood of exploitation in the wild. The flaw is not listed in the CISA KEV catalog. The attack vector is a reflected input that requires a victim to click a crafted link or submit a crafted form, after which the malicious script executes in the victim’s browser. No elevated privileges or server‑side code execution are required.

Generated by OpenCVE AI on May 1, 2026 at 15:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Fast Flow plugin to a version newer than 1.2.16, if a patch is available.
  • If an update is not available, modify the plugin to perform proper output escaping on any user‑controlled input before rendering it in the page.
  • As an interim workaround, deploy a web application firewall rule or rewrite rules that neutralize or block the vulnerable parameters from reflecting user input.

Generated by OpenCVE AI on May 1, 2026 at 15:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5380 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fastflow Fast Flow allows Reflected XSS. This issue affects Fast Flow: from n/a through 1.2.16.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fastflow Fast Flow allows Reflected XSS. This issue affects Fast Flow: from n/a through 1.2.16. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fastflow Fast Flow fast-flow-dashboard allows Reflected XSS.This issue affects Fast Flow: from n/a through <= 1.2.16.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 25 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 14:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fastflow Fast Flow allows Reflected XSS. This issue affects Fast Flow: from n/a through 1.2.16.
Title WordPress Fast Flow plugin <= 1.2.16 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:40.902Z

Reserved: 2025-02-17T11:49:35.312Z

Link: CVE-2025-26868

cve-icon Vulnrichment

Updated: 2025-02-25T19:16:17.810Z

cve-icon NVD

Status : Deferred

Published: 2025-02-25T15:15:23.903

Modified: 2026-04-23T15:25:58.187

Link: CVE-2025-26868

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T15:30:20Z

Weaknesses