Description
The List Children plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'list_children' shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-01
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via shortcode attributes
Action: Update Plugin
AI Analysis

Impact

The List Children plugin for WordPress has a stored cross‑site scripting flaw that occurs when a contributor or higher level user inserts arbitrary scripts through the list_children shortcode. The plugin fails to properly sanitize or escape attributes passed to the shortcode, allowing the malicious payload to be stored in the database and executed in every user’s browser whenever the page containing the shortcode is loaded. This flaw can enable the attacker to run client‑side code in the context of the site but does not grant direct access to server‑side data or functionality outside the scope of the injected script.

Affected Systems

WordPress sites that have the List Children plugin from theandystratton installed in any version up to and including 2.1 are affected. The vulnerability exists wherever the list_children shortcode is used. No other WordPress core or plugin components are impacted.

Risk and Exploitability

The CVSS score is 6.4, indicating moderate severity, and the EPSS score is below 1%, suggesting exploitation is unlikely but still possible. The vulnerability is not listed in the CISA KEV catalog. An attacker must first have contributor-level or higher access on the WordPress site; after that, they can embed a malicious payload via the shortcode, which will then be served to all visitors visiting a page containing the shortcode.

Generated by OpenCVE AI on April 22, 2026 at 01:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the List Children plugin to a version newer than 2.1, such as 2.2 or later, to eliminate the stored XSS flaw.
  • If upgrading is not immediately possible, deactivate or delete the List Children plugin to remove the vulnerable shortcode from the site.
  • Restrict contributor or higher users from inserting shortcodes, or enforce strict input validation on the shortcode parameters as a temporary workaround.

Generated by OpenCVE AI on April 22, 2026 at 01:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15000 The List Children plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'list_children' shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Mon, 19 May 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Sizeable
Sizeable list Children
CPEs cpe:2.3:a:sizeable:list_children:*:*:*:*:*:wordpress:*:*
Vendors & Products Sizeable
Sizeable list Children

Thu, 01 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 01 May 2025 04:30:00 +0000

Type Values Removed Values Added
Description The List Children plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'list_children' shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title List Children <= 2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Sizeable List Children
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:06.514Z

Reserved: 2025-04-29T17:22:51.998Z

Link: CVE-2025-4099

cve-icon Vulnrichment

Updated: 2025-05-01T13:19:19.104Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-01T05:15:52.167

Modified: 2025-05-19T11:49:08.097

Link: CVE-2025-4099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:45:05Z

Weaknesses