Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mojoomla WPAMS apartment-management allows Reflected XSS.This issue affects WPAMS: from n/a through <= 44.0 (17-08-2023).
Published: 2025-05-19
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WPAMS apartment‑management plugin for WordPress contains a reflected cross‑site scripting flaw because user‑supplied input is not properly escaped before being inserted into the generated HTML. An attacker can craft a malicious URL or form payload that includes JavaScript, which is then reflected back to the victim’s browser. This allows the attacker to run arbitrary scripts within the victim’s session, potentially hijacking credentials or defacing the site.

Affected Systems

The vulnerability is present in all releases of the WPAMS plugin from the earliest version through version 44.0, released on 17‑08‑2023. Any WordPress site that has the affected WPAMS plugin installed is susceptible to exploitation.

Risk and Exploitability

The CVSS score of 7.1 indicates a moderate‑to‑high severity, while the EPSS score of less than 1% suggests a low probability of exploitation at this time. The flaw has not been reported in the CISA KEV catalog. Attackers would likely target the web interface by inserting malicious scripts into query parameters or form fields that are reflected in the page output. If exploited, an attacker could deface the site, phish users, or steal session cookies. The lack of authentication requirement for the reflected payload means anyone who visits a crafted URL could be impacted.

Generated by OpenCVE AI on April 30, 2026 at 19:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WPAMS to a version newer than 44.0 or apply any vendor‑supplied patch as soon as it becomes available.
  • If an upgrade cannot be performed immediately, remove the plugin or disable its administration pages to prevent user interaction with the vulnerable code.
  • Configure a web application firewall or enforce a Content‑Security‑Policy that blocks inline scripts and restricts script sources to trusted domains to mitigate the reflected XSS vector.

Generated by OpenCVE AI on April 30, 2026 at 19:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15770 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mojoomla WPAMS allows Reflected XSS.This issue affects WPAMS: from n/a through 44.0 (17-08-2023).
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mojoomla WPAMS allows Reflected XSS.This issue affects WPAMS: from n/a through 44.0 (17-08-2023). Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mojoomla WPAMS apartment-management allows Reflected XSS.This issue affects WPAMS: from n/a through <= 44.0 (17-08-2023).
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Mon, 19 May 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 May 2025 19:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mojoomla WPAMS allows Reflected XSS.This issue affects WPAMS: from n/a through 44.0 (17-08-2023).
Title WordPress WPAMS plugin <= 44.0 (17-08-2023) - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-12T00:17:52.890Z

Reserved: 2025-04-16T06:22:42.846Z

Link: CVE-2025-39392

cve-icon Vulnrichment

Updated: 2025-05-19T21:12:45.639Z

cve-icon NVD

Status : Deferred

Published: 2025-05-19T20:15:24.880

Modified: 2026-04-23T15:29:27.987

Link: CVE-2025-39392

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T19:30:26Z

Weaknesses