Description
The WP Content Security Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blocked-uri and effective-directive parameters in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-15
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The WP Content Security Plugin allows for stored cross‑site scripting by failing to sanitize or escape the blocked‑uri and effective‑directive parameters. An unauthenticated attacker can inject arbitrary JavaScript into these fields, which is subsequently stored and rendered in web pages. When a site visitor accesses a page containing the injected code, the script executes in the user's browser, potentially enabling malicious actions such as session hijacking, data theft, or defacement.

Affected Systems

Vendors and products impacted are the WordPress plugin named WP Content Security Plugin developed by dyland. All releases from the initial version up through and including 2.3 are affected; users of these versions should verify whether they have installed the plugin and consider the version number. No other systems are listed.

Risk and Exploitability

The CVSS score is 7.2, indicating a high severity. The EPSS score is reported as less than 1 %, suggesting a low but non‑zero likelihood of exploitation; the vulnerability is not currently listed in the CISA KEV catalog. Because the flaw is accessed through the public web interface and does not require authentication, it is considered unauthenticated. Exploitation requires the attacker to submit a value for either blocked‑uri or effective‑directive that contains malicious script; the stored data is then served to all users who view the affected page.

Generated by OpenCVE AI on April 20, 2026 at 22:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Content Security Plugin to a version later than 2.3 that removes the XSS flaw.
  • If an upgrade is temporarily unavailable, disable the CSP reporting feature or clear stored report data to prevent script execution.
  • Apply a site-wide content‑security‑policy that blocks inline scripts and restricts sources to trusted domains.
  • Ensure the underlying WordPress installation and all plugins are kept up to date to reduce the attack surface.

Generated by OpenCVE AI on April 20, 2026 at 22:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14943 The WP Content Security Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blocked-uri and effective-directive parameters in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 15 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 02:15:00 +0000

Type Values Removed Values Added
Description The WP Content Security Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blocked-uri and effective-directive parameters in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WP Content Security Plugin <= 2.3 - Unauthenticated Stored Cross-Site Scripting via CSP-Report Fields
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:57.747Z

Reserved: 2025-05-12T13:01:11.410Z

Link: CVE-2025-4579

cve-icon Vulnrichment

Updated: 2025-05-15T14:38:31.295Z

cve-icon NVD

Status : Deferred

Published: 2025-05-15T02:15:21.670

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4579

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:00:14Z

Weaknesses