Description
The DPEPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'dpe' shortcode in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The DPEPress plugin for WordPress, versions up to 0.3, allows authenticated users with contributor-level or higher rights to submit content that is inserted into the plugin’s ’dpe’ shortcode without proper sanitization or escaping. The input fields for shortcode attributes can thus contain arbitrary JavaScript, which is stored in the database and rendered when any site visitor loads a page containing the shortcode. This stored cross‑site scripting (CWE‑79) can lead to session hijacking, cookie theft, or defacement of the site. The vulnerability is limited to users who can create or edit content with the plugin and does not depend on an untrusted external request.

Affected Systems

The affected product is the DPEPress WordPress plugin by darkyudex, specifically all releases through 0.3. Any WordPress site that has this plugin installed and whose moderator or contributor users can add the ’dpe’ shortcode is at risk.

Risk and Exploitability

The CVSS base score of 6.4 indicates a medium severity. The EPSS score is less than 1%, implying a very low likelihood of exploitation at the time of this analysis, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with contributor or higher privileges, and then any site visitor will execute the injected script. While the attack vector is internal (authenticated role), the resulting script runs in the context of any visitor’s browser, potentially compromising their credentials or defacing content.

Generated by OpenCVE AI on April 20, 2026 at 22:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the DPEPress plugin to the latest available version that removes the vulnerability.
  • Disable or remove the ’dpe’ shortcode from all posts and pages if an upgrade is not immediately possible.
  • Aim to restrict contributor-level users from adding plugin shortcodes or consider revoking their capability until a patch is applied.

Generated by OpenCVE AI on April 20, 2026 at 22:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16081 The DPEPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'dpe' shortcode in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 21 May 2025 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 May 2025 09:30:00 +0000

Type Values Removed Values Added
Description The DPEPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'dpe' shortcode in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title DPEPress <= 0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:23:53.860Z

Reserved: 2025-05-02T12:57:08.194Z

Link: CVE-2025-4219

cve-icon Vulnrichment

Updated: 2025-05-21T10:11:33.851Z

cve-icon NVD

Status : Deferred

Published: 2025-05-21T12:16:22.930

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4219

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:00:14Z

Weaknesses