Description
The A/B Testing for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ab-testing-for-wp/ab-test-block' block in all versions up to, and including, 1.18.2 due to insufficient input sanitization and output escaping on the 'id' parameter. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-27
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting leading to arbitrary script execution
Action: Apply Patch
AI Analysis

Impact

The A/B Testing for WordPress plugin contains a stored XSS flaw triggered by the "id" parameter of the "ab-test-block" block. Input is not properly sanitized or escaped, so an attacker can embed JavaScript code. When a page that includes that block is rendered, the injected script runs in the context of the visiting user, enabling cookie theft, phishing, or other malicious actions.

Affected Systems

The vulnerability affects all releases of the A/B Testing for WordPress plugin by johnjamesjacoby up to and including version 1.18.2. WordPress sites that have installed this plugin and granted contributor‑level or higher accounts are potentially impacted.

Risk and Exploitability

The CVSS score of 6.4 rates the flaw as moderately severe, while the EPSS score of less than 1% indicates a low likelihood of exploitation at present. The attack requires an authenticated account with contributor privileges. Since the exploit involves only data entry into the plugin’s block editor, it does not require controlling other users or servers. The flaw is not listed in CISA KEV, so it is not known to be actively exploited in the wild yet.

Generated by OpenCVE AI on April 22, 2026 at 01:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the A/B Testing for WordPress plugin to version 1.18.3 or later where the XSS issue is fixed.
  • If an upgrade is unavailable, uninstall or disable the plugin until a patch is released.
  • As a temporary measure, remove or audit any existing 'ab-test-block' blocks and sanitize the 'id' field manually via the plugin’s settings or by editing the stored data.
  • Ensure that only trusted users have contributor-level access to block editing.

Generated by OpenCVE AI on April 22, 2026 at 01:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19347 The A/B Testing for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ab-testing-for-wp/ab-test-block' block in all versions up to, and including, 1.18.2 due to insufficient input sanitization and output escaping on the 'id' parameter. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 27 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Jun 2025 07:45:00 +0000

Type Values Removed Values Added
Description The A/B Testing for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ab-testing-for-wp/ab-test-block' block in all versions up to, and including, 1.18.2 due to insufficient input sanitization and output escaping on the 'id' parameter. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title A/B Testing for WordPress <= 1.18.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:44.924Z

Reserved: 2025-05-12T15:12:59.602Z

Link: CVE-2025-4587

cve-icon Vulnrichment

Updated: 2025-06-27T13:51:30.843Z

cve-icon NVD

Status : Deferred

Published: 2025-06-27T08:15:22.030

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4587

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:15:07Z

Weaknesses