Impact
A Cross‑Site Request Forgery flaw in the ninotheme Nino Social Connect plugin allows an attacker to store malicious JavaScript in the WordPress database. When an authenticated user submits a crafted request, the plugin records the payload so that any site visitor loading the affected page will execute the stored script. The weakness is categorized as CWE‑352, indicating missing protection against forged requests.
Affected Systems
The vulnerability affects the ninotheme Nino Social Connect plugin for WordPress version 2.0 and earlier. Any WordPress site that runs these versions and has the plugin enabled is at risk.
Risk and Exploitability
The CVSS score of 7.1 places the flaw in the high‑to‑medium risk range while the EPSS score of less than 1% indicates that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. The attack requires an authenticated user and a forged request to be accepted by the plugin; the lack of CSRF protection is inferred from the description of the flaw.
OpenCVE Enrichment
EUVD