Description
The Posts per Cat [Unmaintained plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ppc' shortcode in all versions up to, and including, 1.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-16
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting triggered by authenticated contributor or higher
Action: Immediate Patch
AI Analysis

Impact

The Posts per Cat plugin is vulnerable to stored cross‑site scripting because user‑supplied attributes for the 'ppc' shortcode are neither sanitized nor escaped when saved. A malicious contributor or higher‑level user can embed arbitrary JavaScript that will execute for any visitor who views a page containing the affected shortcode. This can lead to session hijacking, theft of credentials, defacement, or other malicious actions performed under the victim’s user context.

Affected Systems

The vulnerability exists in all releases of the Posts per Cat plugin up to and including version 1.4.2, which is distributed for WordPress sites. The plugin is managed under the vendor urkekg. Sites that have these versions installed with contributor–level or higher users are at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity attack that requires authenticated access. The EPSS score of less than 1% suggests low current exploit probability, and the vulnerability is not yet listed in the CISA KEV catalog. Attackers would need to operate from a contributor or higher account and inject malicious content via the shortcode attributes. Once injected, the script executes in the context of any site visitor, providing potential for widespread compromise of user sessions and data.

Generated by OpenCVE AI on April 21, 2026 at 20:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Posts per Cat plugin to a version that removes the vulnerability; if no newer release exists, consider uninstalling the plugin and replacing it with a maintained alternative.
  • Immediately restrict contributors from using the 'ppc' shortcode, or temporarily revoke their ability to edit posts that contain the shortcode until the issue is resolved.
  • Apply a custom filter or patch that sanitizes and escapes all attributes supplied to the 'ppc' shortcode, ensuring that any user input is removed before storage and rendering.

Generated by OpenCVE AI on April 21, 2026 at 20:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15394 The Posts per Cat [Unmaintained plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ppc' shortcode in all versions up to, and including, 1.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 16 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 May 2025 03:00:00 +0000

Type Values Removed Values Added
Description The Posts per Cat [Unmaintained plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ppc' shortcode in all versions up to, and including, 1.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Posts per Cat [Unmaintained] <= 1.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:13.417Z

Reserved: 2025-05-01T12:14:49.909Z

Link: CVE-2025-4169

cve-icon Vulnrichment

Updated: 2025-05-16T15:44:39.528Z

cve-icon NVD

Status : Deferred

Published: 2025-05-16T03:15:21.423

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4169

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:00:35Z

Weaknesses