Impact
The Relevanssi – A Better Search plugin for WordPress is vulnerable to stored cross‑site scripting because the highlights feature does not properly sanitize or escape user input. Arbitrary scripts injected by unauthenticated attackers are persisted in the search result content and are executed in the browser context of any visitor who views a page containing the highlighted content. This flaw allows attackers to deface sites, steal user credentials, or deliver malware.
Affected Systems
WordPress sites running Relevanssi – A Better Search, both the free and premium editions, up to and including version 4.24.3 for the free edition and version 2.27.4 for the premium edition. These versions are distributed through the WordPress Plugin Repository and the official Relevanssi website.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The attack vector is remote, web‑based, and requires no authentication; this inference is based on the description of stored scripts executing when users access search results. While the vulnerability is not listed in the CISA KEV catalog, the ability for any visitor to trigger the payload keeps the risk significant for affected sites.
OpenCVE Enrichment
EUVD