Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bingu replyMail replymail allows Stored XSS.This issue affects replyMail: from n/a through <= 1.2.0.
Published: 2025-11-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The bingu replyMail WordPress plugin contains an improper neutralization of input during web page generation that allows attackers to store malicious script code. The stored payload is rendered unchanged on pages generated by the plugin, causing it to execute in the browsers of visitors who view those pages.

Affected Systems

Affected sites are WordPress installations that use bingu replyMail plugin versions 1.2.0 or earlier. The vulnerability applies to all releases of the plugin up to this version, with no minimum version specified; any installation with a version in that range remains at risk.

Risk and Exploitability

The flaw receives a CVSS score of 7.1, indicating high severity, while an EPSS score of less than 1% suggests that exploitation is currently uncommon. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to submit content containing malicious scripts through the plugin’s input interface; based on the description, it is inferred that the likelihood of a successful attack depends on whether that endpoint is publicly reachable or restricted to certain user roles.

Generated by OpenCVE AI on May 2, 2026 at 11:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the replyMail plugin to a version that includes proper input sanitization if an updated release is available.
  • Limit content submission to trusted administrators and ensure that any submissions are sanitized on the server side before storage.
  • Implement server‑side filtering to strip or encode script tags and other potentially harmful payloads from user input.
  • Deploy a web application firewall rule set that detects and blocks stored script injections to add an additional layer of defense.

Generated by OpenCVE AI on May 2, 2026 at 11:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 10 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bingu replyMail replymail allows Stored XSS.This issue affects replyMail: from n/a through <= 1.2.0.
Title WordPress replyMail plugin <= 1.2.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-79
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:03.896Z

Reserved: 2025-03-26T09:23:14.825Z

Link: CVE-2025-31029

cve-icon Vulnrichment

Updated: 2025-11-10T19:43:02.662Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:15:50.067

Modified: 2026-04-27T16:16:26.517

Link: CVE-2025-31029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T12:00:14Z

Weaknesses