Impact
The Kento WordPress Stats plugin contains an input handling flaw that does not properly neutralize content before rendering it in web pages. This flaw allows an attacker to store malicious scripts that are executed when a page containing the stored content is loaded by a visitor. The vulnerability is a stored cross‑site scripting issue and is indexed as CWE‑79.
Affected Systems
The affected product is the PluginsPoint Kento WordPress Stats plugin, with all releases from n/a through version ≤ 1.1 vulnerable. No specific release is exempt.
Risk and Exploitability
The CVSS score of 7.1 indicates a high severity level. The EPSS score of less than 1% shows that the likelihood of exploitation at present is very low, and the vulnerability is not listed in CISA’s KEV catalog. Likely attack vectors include a user with permission to submit or edit content within WordPress or to configure the plugin, thereby storing a malicious payload that is later rendered for all site visitors.
OpenCVE Enrichment
EUVD