Impact
The List Children plugin for WordPress has a stored cross‑site scripting flaw that occurs when a contributor or higher level user inserts arbitrary scripts through the list_children shortcode. The plugin fails to properly sanitize or escape attributes passed to the shortcode, allowing the malicious payload to be stored in the database and executed in every user’s browser whenever the page containing the shortcode is loaded. This flaw can enable the attacker to run client‑side code in the context of the site but does not grant direct access to server‑side data or functionality outside the scope of the injected script.
Affected Systems
WordPress sites that have the List Children plugin from theandystratton installed in any version up to and including 2.1 are affected. The vulnerability exists wherever the list_children shortcode is used. No other WordPress core or plugin components are impacted.
Risk and Exploitability
The CVSS score is 6.4, indicating moderate severity, and the EPSS score is below 1%, suggesting exploitation is unlikely but still possible. The vulnerability is not listed in the CISA KEV catalog. An attacker must first have contributor-level or higher access on the WordPress site; after that, they can embed a malicious payload via the shortcode, which will then be served to all visitors visiting a page containing the shortcode.
OpenCVE Enrichment
EUVD