Description
The KiwiChat NextClient plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-02
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via the url parameter (authenticated contributors and above).
Action: Immediate Patch
AI Analysis

Impact

A content injection flaw in the KiwiChat NextClient plugin allows authenticated users with Contributor or higher roles to embed malicious JavaScript into the plugin’s url parameter. Because the input is stored and then rendered without escaping, every subsequent page view by any user runs the injected code. This flaw is a CWE‑79 Stored Cross‑Site Scripting vulnerability.

Affected Systems

The vulnerability applies to the WordPress plugin KiwiChat NextClient, all versions up to and including 6.2. An attacker must be logged in with Contributor level access or higher to exploit the flaw.

Risk and Exploitability

The CVSS score of 6.4 reflects moderate severity, and the EPSS score of less than 1% indicates low exploitation probability at this time. The flaw is not listed in the CISA KEV catalog. Exploitation requires authenticated access, meaning the attacker must first obtain or create a Contributor‑level account. Once authenticated, the attacker can persistently inject scripts that execute on any client loading the affected page.

Generated by OpenCVE AI on April 22, 2026 at 04:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's patch by updating KiwiChat NextClient to the latest version released after 6.2.
  • Scan the database for and delete any stored URLs that contain script tags or JavaScript payloads.
  • Review or revoke contributor-level access for users who no longer need it, limiting the risk of further XSS injection.

Generated by OpenCVE AI on April 22, 2026 at 04:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12801 The KiwiChat NextClient plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 02 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 May 2025 02:30:00 +0000

Type Values Removed Values Added
Description The KiwiChat NextClient plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title KiwiChat NextClient <= 6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via url Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:57.552Z

Reserved: 2025-04-15T21:51:15.303Z

Link: CVE-2025-3670

cve-icon Vulnrichment

Updated: 2025-05-02T17:20:22.696Z

cve-icon NVD

Status : Deferred

Published: 2025-05-02T03:15:20.700

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3670

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:15:07Z

Weaknesses