Description
The Bon Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bt-map' shortcode in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-15
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The Bon Toolkit plugin’s bt‑map shortcode contains a stored cross‑site scripting flaw that allows an authenticated user with contributor‑level permissions to insert arbitrary JavaScript into the page content. The injected code is saved to the database and is rendered to every visitor who loads a page that contains the shortcode, leading to persistent client‑side script execution. This vulnerability is a classic example of a CWE‑79 weakness caused by insufficient input validation and output escaping.

Affected Systems

All WordPress installations that include Bon Toolkit version 1.3.2 or earlier and have enabled the bt‑map shortcode are affected. The flaw requires an account with contributor or higher privileges to add or edit content containing the shortcode; therefore, any site that allows such contributors to modify posts or pages where the shortcode may appear is vulnerable.

Risk and Exploitability

With a CVSS score of 6.4 the issue is classified as moderate severity, and an EPSS score of less than 1 % indicates a low current exploitation probability. The attack vector is inferred to be the use of the provided shortcode by a contributor who can edit content; an attacker who compromises or is granted such credentials can persist malicious scripts that run for all site visitors until the plugin is updated or the content is sanitized. The CVE is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on April 22, 2026 at 01:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bon Toolkit to the latest released version (any version newer than 1.3.2).
  • Search the site’s database for any posts, pages, or content that include the bt‑map shortcode, and remove or clean any injected scripts before the upgrade.
  • Restrict or disable contributor privileges for accounts that are not explicitly trusted, or temporarily revoke such permissions while the vulnerability is addressed.

Generated by OpenCVE AI on April 22, 2026 at 01:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14954 The Bon Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bt-map' shortcode in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 15 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Bon Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bt-map' shortcode in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Bon Toolkit <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:18.928Z

Reserved: 2025-05-12T15:17:10.936Z

Link: CVE-2025-4589

cve-icon Vulnrichment

Updated: 2025-05-15T14:25:46.227Z

cve-icon NVD

Status : Deferred

Published: 2025-05-15T04:16:17.527

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:45:05Z

Weaknesses