Description
The AAWP Obfuscator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data-aawp-web' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-04-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via author‑level input
Action: Apply Patch
AI Analysis

Impact

The AAWP Obfuscator plugin can store malicious scripts in the data-aawp-web field because the input is not sanitized or escaped. When a user views the affected page, the unsanitized script runs in that user’s browser, giving the attacker the ability to steal session cookies, deface content, or perform phishing attacks. The flaw is limited to authenticated accounts that have Author or higher privileges, but many WordPress installations grant these roles widely.

Affected Systems

WordPress sites that have the elpix AAWP Obfuscator plugin installed in any version up to and including 1.0 are affected. The vulnerability exists in all these releases regardless of configuration. Site administrators should verify whether the plugin is present and at which version.

Risk and Exploitability

The CVSS score of 6.4 reflects a moderate damage potential and an attack path that requires prior authentication. The EPSS score of less than 1 % indicates the exploitation probability is currently low, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, because the flaw allows persistent arbitrary JavaScript execution, any attacker who gains or already possesses Author‑level credentials can compromise other user sessions or deface the site. The risk remains high for sites that expose the data-aawp-web parameter to content editors without additional filtering.

Generated by OpenCVE AI on April 22, 2026 at 17:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the AAWP Obfuscator plugin to the latest release, which removes the insecure data-aawp-web handling.
  • Restrict Author‑level permissions to only trusted individuals and consider demoting or disabling the role if it is not required.
  • Implement a web‑application firewall or server‑side sanitization rule that blocks or escapes JavaScript code submitted through the data-aawp-web parameter until a patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 17:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10326 The AAWP Obfuscator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data-aawp-web' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 08 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Apr 2025 08:30:00 +0000

Type Values Removed Values Added
Description The AAWP Obfuscator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data-aawp-web' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title AAWEP Obfuscator <= 1.0 - Authenticated (Author+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:42:47.217Z

Reserved: 2025-04-07T19:48:39.838Z

Link: CVE-2025-3432

cve-icon Vulnrichment

Updated: 2025-04-08T13:19:21.467Z

cve-icon NVD

Status : Deferred

Published: 2025-04-08T09:15:28.630

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T17:45:22Z

Weaknesses