Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tayoricom Tayori Form tayori allows Reflected XSS.This issue affects Tayori Form: from n/a through <= 1.2.9.
Published: 2025-05-23
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper neutralization of input in the Tayori Form plugin allows attackers to inject malicious scripts via user‑supplied data that is reflected back into the page. This reflected Cross‑Site Scripting vulnerability (CWE‑79) can be used to steal session cookies, deface the site, or execute arbitrary client‑side code in the victim’s browser, potentially compromising user confidentiality and enabling further attacks.

Affected Systems

This issue affects the WordPress Tayori Form plugin in all releases from the earliest publicly available version up through 1.2.9. Any website that installs or updates the plugin to a vulnerable version is at risk.

Risk and Exploitability

The CVSS base score of 7.1 indicates a high‑severity vulnerability, while the EPSS score of < 1% suggests a low probability of current exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker can exploit the flaw by crafting a URL or form input containing malicious JavaScript, which will be reflected in the response of a Tayori Form page, allowing remote code execution in the context of the site’s users. Because the flaw stems from insufficient input sanitization, any user who is tricked into opening a crafted link can be affected.

Generated by OpenCVE AI on May 1, 2026 at 08:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tayori Form plugin to a version newer than 1.2.9, applying any vendor‑supplied patches that address XSS handling.
  • If an upgrade is not currently possible, remove or deactivate the plugin from the site to eliminate the vulnerable code path.
  • Deploy a Web Application Firewall rule set or a Content Security Policy that blocks reflected XSS payloads and front‑ends the user input handling to mitigate any residual risk.

Generated by OpenCVE AI on May 1, 2026 at 08:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28039 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tayoricom Tayori Form allows Reflected XSS. This issue affects Tayori Form: from n/a through 1.2.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tayoricom Tayori Form allows Reflected XSS. This issue affects Tayori Form: from n/a through 1.2.9. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tayoricom Tayori Form tayori allows Reflected XSS.This issue affects Tayori Form: from n/a through <= 1.2.9.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 23 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 May 2025 13:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tayoricom Tayori Form allows Reflected XSS. This issue affects Tayori Form: from n/a through 1.2.9.
Title WordPress Tayori Form plugin <= 1.2.9 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:37.499Z

Reserved: 2025-04-24T14:22:09.615Z

Link: CVE-2025-46437

cve-icon Vulnrichment

Updated: 2025-05-23T13:42:01.054Z

cve-icon NVD

Status : Deferred

Published: 2025-05-23T13:15:33.757

Modified: 2026-04-23T15:29:59.250

Link: CVE-2025-46437

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:15:12Z

Weaknesses