Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag at-internet allows Reflected XSS.This issue affects AT Internet SmartTag: from n/a through <= 0.2.
Published: 2025-04-17
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper neutralization of input during web page generation results in a reflected Cross‑Site Scripting vulnerability. The AT Internet SmartTag plugin fails to sanitize user input, allowing malicious scripts to be inserted into the page that is delivered to a victim. An attacker capable of crafting a malicious URL or input can cause the victim’s browser to execute arbitrary JavaScript, potentially enabling session hijacking, credential theft, or defacement purposes. This flaw is classified as CWE‑79.

Affected Systems

The vulnerability is found in the BenDlz AT Internet SmartTag WordPress plugin. All releases from the earliest version up to and including 0.2 are impacted. Users running any of these plugin versions on a WordPress site should consider them vulnerable until the issue is resolved.

Risk and Exploitability

The CVSS base score of 7.1 denotes a high severity reflected XSS vulnerability. The EPSS score of less than 1% indicates a low likelihood of exploitation on a global scale, but because the flaw is user‑controlled input, an attacker could target individual sites with minimal effort. The vulnerability is not listed in the CISA KEV catalog, so there are no confirmed large‑scale exploitation incidents at this time. An attacker with access to a public URL could launch the exploit, so protection requires stalling the malicious input or removing the vulnerable plugin entirely.

Generated by OpenCVE AI on May 1, 2026 at 09:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AT Internet SmartTag plugin to the latest available version, which is known to contain the fixed input sanitization logic.
  • If an upgrade is not immediately possible, temporarily deactivate or uninstall the plugin to eliminate the reflected XSS surface.
  • Keep the WordPress core and all other plugins up to date to avoid any overlap of other security issues, and consider implementing a Web Application Firewall that blocks suspicious script payloads.

Generated by OpenCVE AI on May 1, 2026 at 09:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11651 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag allows Reflected XSS. This issue affects AT Internet SmartTag: from n/a through 0.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag allows Reflected XSS. This issue affects AT Internet SmartTag: from n/a through 0.2. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag at-internet allows Reflected XSS.This issue affects AT Internet SmartTag: from n/a through <= 0.2.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag allows Reflected XSS. This issue affects AT Internet SmartTag: from n/a through 0.2.
Title WordPress AT Internet SmartTag plugin <= 0.2 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:23.234Z

Reserved: 2025-04-09T11:19:28.416Z

Link: CVE-2025-32506

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:39.737

Modified: 2026-04-23T15:29:00.427

Link: CVE-2025-32506

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T09:45:07Z

Weaknesses