Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix FAQ arconix-faq allows Reflected XSS.This issue affects Arconix FAQ: from n/a through <= 1.9.5.
Published: 2025-04-17
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Arconix FAQ plugin contains an improper neutralization of input that leads to a reflected cross‑site scripting vulnerability. Because malicious data can be injected and executed in the browser when the plugin outputs user supplied content without proper encoding, an attacker can manipulate the client side of a site that uses this plugin. The flaw is identified as CWE‑79 and presents a risk to the confidentiality and integrity of any data accessed by the victim’s browser.

Affected Systems

All installations of the TycheSoftwares Arconix FAQ WordPress plugin with a version equal to or older than 1.9.5 are affected. Sites that embed this plugin and expose the reflected input parameters are potentially vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 7.1, placing it in the medium‑high severity band. The EPSS value of less than 1% indicates a very low probability of exploitation at the time of analysis. It has not been catalogued in CISA’s KEV list. The typical exploitation path would involve an attacker crafting a link or form that passes malicious payloads to the plugin, requiring the victim to interact with that content in order for the script to execute.

Generated by OpenCVE AI on May 1, 2026 at 09:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any Arconix FAQ plugin release newer than 1.9.5 to remove the flaw.
  • If an update is not immediately possible, ensure that any user‑supplied data echoed by the plugin is properly encoded or sanitized before rendering.
  • Restrict access to the plugin’s input and administrative interfaces to trusted users to reduce the attack surface.

Generated by OpenCVE AI on May 1, 2026 at 09:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11668 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix FAQ allows Reflected XSS. This issue affects Arconix FAQ: from n/a through 1.9.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix FAQ allows Reflected XSS. This issue affects Arconix FAQ: from n/a through 1.9.5. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix FAQ arconix-faq allows Reflected XSS.This issue affects Arconix FAQ: from n/a through <= 1.9.5.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix FAQ allows Reflected XSS. This issue affects Arconix FAQ: from n/a through 1.9.5.
Title WordPress Arconix FAQ plugin <= 1.9.5 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Tychesoftwares Arconix Faq
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:23.776Z

Reserved: 2025-04-09T11:19:42.424Z

Link: CVE-2025-32531

cve-icon Vulnrichment

Updated: 2025-04-17T18:06:09.703Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:42.003

Modified: 2026-04-23T15:29:03.303

Link: CVE-2025-32531

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T09:45:07Z

Weaknesses