Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smartredfox Pretty file links pretty-file-links allows Stored XSS.This issue affects Pretty file links: from n/a through <= 0.9.
Published: 2025-03-24
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This flaw allows malicious input to be stored and reflected in generated web pages, enabling attackers to execute arbitrary scripts in users' browsers. The stored XSS is identified by CWE‑79. Based on the description, it is inferred that the attack involves injecting JavaScript that executes when a victim views a page contaminated with the payload, potentially stealing session cookies, defacing the site or redirecting users.

Affected Systems

The vulnerability applies to the Pretty file links plugin from the vendor smartredfox, for all releases up to and including version 0.9. Any WordPress site that has this plugin installed and is unaware of the stored XSS vulnerability could be impacted.

Risk and Exploitability

The CVSS score of 6.5 places the issue in the medium severity range. The EPSS score of less than 1 percent indicates a very low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the likely attack vector involves an attacker submitting malicious payloads through the plugin’s input interfaces, which are processed and stored for later rendering. The flaw would require an attacker first to supply malicious input to the plugin’s data store, which is likely feasible through any input that the plugin accepts from site administrators or users with privileges. Once stored, the script would run in the browsers of any visitor to the affected page, presenting a risk to confidentiality and integrity of users.

Generated by OpenCVE AI on May 2, 2026 at 03:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Pretty file links to the latest available version that removes the stored XSS issue.
  • If an update is not possible immediately, disable or remove the plugin until a patch can be applied.
  • Deploy a web application firewall rule that blocks or sanitizes known XSS payloads in URLs and content handled by the plugin.
  • Ensure WordPress core and other plugins are kept current to mitigate related security gaps.

Generated by OpenCVE AI on May 2, 2026 at 03:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7964 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smartredfox Pretty file links allows Stored XSS. This issue affects Pretty file links: from n/a through 0.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smartredfox Pretty file links allows Stored XSS. This issue affects Pretty file links: from n/a through 0.9. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smartredfox Pretty file links pretty-file-links allows Stored XSS.This issue affects Pretty file links: from n/a through <= 0.9.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Mon, 24 Mar 2025 14:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smartredfox Pretty file links allows Stored XSS. This issue affects Pretty file links: from n/a through 0.9.
Title WordPress Pretty file links plugin <= 0.9 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:53.712Z

Reserved: 2025-03-24T12:59:58.192Z

Link: CVE-2025-30551

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-03-24T14:15:24.260

Modified: 2026-04-23T15:26:51.027

Link: CVE-2025-30551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T03:30:16Z

Weaknesses