Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Popping Content Light popping-content-light allows Reflected XSS.This issue affects Popping Content Light: from n/a through <= 2.4.
Published: 2025-04-10
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Popping Content Light plugin for WordPress contains an improper neutralization of input during web page generation, allowing a reflected cross‑site scripting attack. An external user can provide specially crafted input that is echoed back in the page, enabling the execution of arbitrary client‑side scripts. This flaw can be used to alter the displayed content or interact with the site in unintended ways.

Affected Systems

The vulnerability affects any installation of the OTWthemes Popping Content Light WordPress plugin version 2.4 and earlier, including all releases from the earliest build up to and including 2.4.

Risk and Exploitability

The CVSS score of 7.1 indicates a medium‑to‑high severity level. The EPSS score of less than 1% suggests the probability of exploitation is very low. The vulnerability is not listed in CISA KEV. The likely attack vector is a web‑based user accessing a malicious URL or input field that is reflected by the plugin, which requires the victim to load the crafted content in a browser. The overall risk is significant for sites that expose the plugin to external users, but the likelihood of exploitation remains low based on current evidence.

Generated by OpenCVE AI on May 1, 2026 at 10:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OTWthemes Popping Content Light to a version newer than 2.4, or uninstall the plugin if it is not required.
  • If an update is delayed, disable the plugin or the specific features that process external input until a fix is available to prevent reflected XSS payloads.
  • Deploy a Web Application Firewall or implement a Content Security Policy that restricts script execution and blocks unexpected injection patterns for additional protection.

Generated by OpenCVE AI on May 1, 2026 at 10:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10482 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Popping Content Light allows Reflected XSS. This issue affects Popping Content Light: from n/a through 2.4.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Popping Content Light allows Reflected XSS. This issue affects Popping Content Light: from n/a through 2.4. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Popping Content Light popping-content-light allows Reflected XSS.This issue affects Popping Content Light: from n/a through <= 2.4.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 10 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Apr 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Popping Content Light allows Reflected XSS. This issue affects Popping Content Light: from n/a through 2.4.
Title WordPress Popping Content Light plugin <= 2.4 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:16.623Z

Reserved: 2025-04-04T10:00:22.653Z

Link: CVE-2025-32115

cve-icon Vulnrichment

Updated: 2025-04-10T13:14:50.477Z

cve-icon NVD

Status : Deferred

Published: 2025-04-10T08:15:15.543

Modified: 2026-04-23T15:28:35.200

Link: CVE-2025-32115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T10:45:05Z

Weaknesses