Impact
The BMo Expo plugin for WordPress fails to properly neutralize user‑supplied input, allowing malicious code to be stored in the database. The stored XSS flaw enables an attacker to embed arbitrary JavaScript that executes in the browsers of site visitors, thereby potentially compromising user sessions and leaking sensitive information.
Affected Systems
The vulnerability affects the Benedikt Mo BMo Expo WordPress plugin on any installation using version 1.0.15 or earlier. Administrators should verify the plugin version on every WordPress site where this component is installed.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate risk, while the EPSS score of less than 1% suggests that the likelihood of exploitation is low at present. The vulnerability is not listed in CISA's KEV catalog. Based on the description, the attack vector is inferred to be through the plugin’s front‑end or administrative input areas where user data is processed before being stored.
OpenCVE Enrichment
EUVD