Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixelDima Dima Take Action dima-take-action allows Stored XSS.This issue affects Dima Take Action: from n/a through <= 1.0.5.
Published: 2025-04-01
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper neutralization of input during web page generation allows attackers to inject malicious scripts that are stored and subsequently served to visitors of sites running the Dima Take Action plugin. This stored XSS flaw (CWE‑79) lets an attacker execute arbitrary JavaScript in the browser context of any user who views the affected content, potentially enabling session hijacking, defacement, or the delivery of malware.

Affected Systems

WordPress installations that include the Dima Take Action plugin from any unknown initial release up to and including version 1.0.5 are affected. The plugin is provided by PixelDima and is commonly used for website maintenance and event management. If a site administrator has a version of the plugin older than or equal to 1.0.5, it likely contains the vulnerable code.

Risk and Exploitability

The CVSS base score of 5.9 places this issue in the medium severity range. The low EPSS score (< 1 %) indicates that exploits are currently uncommon, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation would typically require an attacker to supply input that is stored by the plugin—such as through admin‑only forms or content submissions—before the data is displayed to other users. Once the payload is stored, any visitor to the affected page will process the script in their browser, creating the full stored XSS attack surface.

Generated by OpenCVE AI on May 1, 2026 at 02:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Dima Take Action plugin to the latest version (≥ 1.0.6) once it is available, ensuring all input handling flaws are patched.
  • If an update is not possible, remove or deactivate the plugin to eliminate the vector for stored XSS until a safe version is released.
  • As a temporary measure, apply content‑security‑policy headers or a web‑application firewall rule that sanitizes or blocks suspicious JavaScript payloads in the plugin’s input fields, thereby reducing the risk of executing arbitrary code.

Generated by OpenCVE AI on May 1, 2026 at 02:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9272 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixelDima Dima Take Action allows Stored XSS. This issue affects Dima Take Action: from n/a through 1.0.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixelDima Dima Take Action allows Stored XSS. This issue affects Dima Take Action: from n/a through 1.0.5. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixelDima Dima Take Action dima-take-action allows Stored XSS.This issue affects Dima Take Action: from n/a through <= 1.0.5.
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Wed, 02 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 15:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixelDima Dima Take Action allows Stored XSS. This issue affects Dima Take Action: from n/a through 1.0.5.
Title WordPress Dima Take Action Plugin <= 1.0.5 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:11.259Z

Reserved: 2025-04-01T13:19:05.360Z

Link: CVE-2025-31742

cve-icon Vulnrichment

Updated: 2025-04-02T15:48:27.741Z

cve-icon NVD

Status : Deferred

Published: 2025-04-01T15:16:10.367

Modified: 2026-04-23T15:28:10.367

Link: CVE-2025-31742

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T02:30:06Z

Weaknesses