Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in C. Johnson Footnotes for WordPress footnotes-for-wordpress allows Stored XSS.This issue affects Footnotes for WordPress: from n/a through <= 2016.1230.
Published: 2025-04-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw in the Footnotes for WordPress plugin caused by improper neutralization of user input before rendering it on a web page. Malicious code injected into a footnote will execute in the browsers of any visitor who views the content, potentially allowing the attacker to hijack sessions, deface content, or run arbitrary scripts in the victim’s context.

Affected Systems

All releases of the C. Johnson Footnotes for WordPress plugin from the first unspecified version through 2016.1230 inclusive are affected; any WordPress site containing the plugin on or before this version is vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity, while an EPSS score of less than 1% suggests exploitation is unlikely yet still possible. The vulnerability is stored, meaning the malicious code remains present until the content is modified or the plugin is updated. The exploit requires the ability to create or edit footnotes, which may be limited to users with appropriate permissions; the description does not state this explicitly, but it is a reasonable inference based on how stored XSS typically operates. Attackers would submit malicious input through the plugin’s interface, and the code would then execute for all site visitors who load the affected footnote.

Generated by OpenCVE AI on May 1, 2026 at 11:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Footnotes for WordPress plugin to a release newer than 2016.1230 where the issue is fixed.
  • If an upgrade is not immediately available, disable or delete the plugin to eliminate the attack surface.
  • As a temporary mitigation, restrict footnote editing permissions to trusted administrators only and configure your site’s content‑security policy to block inline scripts.

Generated by OpenCVE AI on May 1, 2026 at 11:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9284 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in C. Johnson Footnotes for WordPress allows Stored XSS. This issue affects Footnotes for WordPress: from n/a through 2016.1230.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in C. Johnson Footnotes for WordPress allows Stored XSS. This issue affects Footnotes for WordPress: from n/a through 2016.1230. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in C. Johnson Footnotes for WordPress footnotes-for-wordpress allows Stored XSS.This issue affects Footnotes for WordPress: from n/a through <= 2016.1230.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Tue, 01 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 15:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in C. Johnson Footnotes for WordPress allows Stored XSS. This issue affects Footnotes for WordPress: from n/a through 2016.1230.
Title WordPress Footnotes for WordPress plugin <= 2016.1230 - Cross Site Scripting (XSS) Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:11.264Z

Reserved: 2025-04-01T13:18:48.161Z

Link: CVE-2025-31735

cve-icon Vulnrichment

Updated: 2025-04-01T20:33:00.679Z

cve-icon NVD

Status : Deferred

Published: 2025-04-01T15:16:09.620

Modified: 2026-04-23T15:28:08.863

Link: CVE-2025-31735

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T12:00:15Z

Weaknesses