Impact
The vulnerability is an improper neutralization of input during web page generation, allowing stored Cross‑Site Scripting (XSS). A malicious actor can inject script payloads that will execute when the affected WordPress pages load, potentially compromising user sessions, stealing credentials, or defacing the site. This weakness falls under CWE‑79. The attack is not zero‑day; known and can be deployed by anyone with write access to the plugin’s input fields.
Affected Systems
The issue affects the WordPress plugin Bee Layer Slider by aumsrini, for all releases up through version 1.1. Any WordPress installation that has this plugin installed and runs version 1.1 or earlier is vulnerable. No other vendors or product versions are listed as affected.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through the plugin’s administrative interface where input is stored without proper sanitization; an attacker with such access can embed malicious code that will later run for all site visitors. Early exploitation requires the attacker to target a WordPress site running the vulnerable plugin version.
OpenCVE Enrichment
EUVD