Impact
An improper neutralization of input during web page generation in the Magnigenie RestroPress WordPress plugin allows an attacker to inject malicious scripts that are reflected back to users who visit crafted URLs. This reflected XSS flaw can be leveraged to steal user session cookies, deface the site, or redirect victims to phishing pages, thereby compromising confidentiality, integrity, and availability of the web application. The weakness is classified as CWE‑79.
Affected Systems
WordPress sites running the Magnigenie RestroPress plugin version 3.2.8.4 or earlier are affected. The vulnerability applies to all deployments of the plugin that have not been updated to a newer release that corrects the input sanitization issue.
Risk and Exploitability
The CVSS score of 7.1 indicates a high‑impact vulnerability, yet the EPSS score of less than 1% reflects a very low likelihood of exploitation at this time, and the vulnerability is not listed in CISA's KEV catalog. The likely attack vector is a remote, unauthenticated user visiting a URL containing malicious payloads that the plugin echoes back in the response. Successful exploitation would allow an attacker to hijack user sessions, spread malicious content, or manipulate website content.
OpenCVE Enrichment
EUVD