Description
The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.22 due to insufficient input sanitization and output escaping in tasks discussion. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2025-04-09
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via SVG uploads (authenticated access required).
Action: Immediate Patch
AI Analysis

Impact

The WordPress plugin WP Project Manager is vulnerable to stored XSS because SVG file uploads are not properly sanitized and output escaped when submitted in tasks discussion. An authenticated user with Subscriber level or higher, with permissions granted by an Administrator, can inject arbitrary JavaScript that will execute in the browser of any user who opens the malicious SVG file, potentially leaking cookies or hijacking sessions.

Affected Systems

All installations of the WP Project Manager plugin for WordPress up to and including version 2.6.22, developed by WeDevs under the name Project Manager – AI Powered Project Management, Task Management, Kanban Board & Time Tracker.

Risk and Exploitability

The CVSS v3 score of 6.4 indicates moderate severity, and the EPSS score of less than 1% shows a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The attack vector requires an authenticated user at Subscriber level or above; after uploading a crafted SVG file the script runs automatically when any user views the file, spreading the exploit to all site visitors.

Generated by OpenCVE AI on April 21, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Project Manager plugin to version 2.6.23 or later to remove the vulnerability.
  • If upgrade is not immediately possible, disable SVG file uploads for Subscriber+ roles or remove the file upload feature entirely.
  • Use a defensive measure such as an additional content filter or a web application firewall that blocks or sanitizes SVG uploads.

Generated by OpenCVE AI on April 21, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15089 The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.22 due to insufficient input sanitization and output escaping in tasks discussion. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00035}

epss

{'score': 0.00032}


Mon, 14 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Wedevs
Wedevs wp Project Manager
CPEs cpe:2.3:a:wedevs:wp_project_manager:*:*:*:*:*:wordpress:*:*
Vendors & Products Wedevs
Wedevs wp Project Manager

Wed, 09 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 04:30:00 +0000

Type Values Removed Values Added
Description The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.22 due to insufficient input sanitization and output escaping in tasks discussion. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts <= 2.6.22 - Authenticated (Subscriber+) Stored Cross-Site Scripting via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wedevs Wp Project Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:27.778Z

Reserved: 2025-04-01T16:29:10.873Z

Link: CVE-2025-3100

cve-icon Vulnrichment

Updated: 2025-04-09T19:22:40.268Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-09T05:15:43.253

Modified: 2025-07-14T17:27:25.530

Link: CVE-2025-3100

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:30:45Z

Weaknesses