Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ufukart Comment Approved Notifier Extended comment-approved-notifier-extended allows Stored XSS.This issue affects Comment Approved Notifier Extended: from n/a through <= 5.2.
Published: 2025-03-27
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the ufukart Comment Approved Notifier Extended WordPress plugin and allows stored XSS. When an attacker crafts malicious input that is subsequently displayed in the plugin’s comment approval notifications, the script runs in the context of any user who views the populated page, exposing the attacker to the victim’s session cookies and the ability to perform malicious actions on the site.

Affected Systems

Versions of Comment Approved Notifier Extended up to and including 5.2 are affected. The plugin is distributed by the vendor "ufukart" and any WordPress installation utilizing these or earlier versions of the plugin is at risk.

Risk and Exploitability

The CVSS score of 5.9 indicates moderate severity, while the EPSS score of less than 1% shows a low probability of exploitation under current conditions. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is a web‑based interaction with the WordPress site, where the attacker submits malicious comment data that the plugin stores and later outputs without proper encoding or escaping, following CWE‑79. The exploit would require an authenticated or unauthenticated user to trigger the comment approval notification flow.

Generated by OpenCVE AI on May 1, 2026 at 13:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Comment Approved Notifier Extended to the latest version that removes the stored XSS flaw.
  • If a patch cannot be applied immediately, temporarily disable the comment approval notification feature to prevent execution of untrusted input.
  • As a temporary protective step, review stored comments for malicious payloads and apply proper output escaping or sanitization to any user‑submitted content before rendering, following input validation best practices for preventing CWE‑79.

Generated by OpenCVE AI on May 1, 2026 at 13:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8373 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zumbo Comment Approved Notifier Extended allows Stored XSS. This issue affects Comment Approved Notifier Extended: from n/a through 5.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zumbo Comment Approved Notifier Extended allows Stored XSS. This issue affects Comment Approved Notifier Extended: from n/a through 5.2. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ufukart Comment Approved Notifier Extended comment-approved-notifier-extended allows Stored XSS.This issue affects Comment Approved Notifier Extended: from n/a through <= 5.2.
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Thu, 27 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 11:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zumbo Comment Approved Notifier Extended allows Stored XSS. This issue affects Comment Approved Notifier Extended: from n/a through 5.2.
Title WordPress Comment Approved Notifier Extended plugin <= 5.2 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:57.411Z

Reserved: 2025-03-26T09:20:11.232Z

Link: CVE-2025-30792

cve-icon Vulnrichment

Updated: 2025-03-27T13:59:16.021Z

cve-icon NVD

Status : Deferred

Published: 2025-03-27T11:15:40.620

Modified: 2026-04-23T15:27:04.723

Link: CVE-2025-30792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T13:15:20Z

Weaknesses