Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFable Fable Extra fable-extra allows DOM-Based XSS.This issue affects Fable Extra: from n/a through <= 1.0.6.
Published: 2025-04-24
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper neutralization of user input during web page generation allows an attacker to inject malicious scripts that execute in the victim's browser. The vulnerability is a DOM‑based cross‑site scripting flaw, meaning the attacker can craft URLs or form data that the plugin processes without proper encoding or validation, leading to potential session hijacking, defacement, or redirection to malicious sites. This weakness, identified as CWE‑79, compromises the confidentiality and integrity of user data and can affect any user interacting with the plugin’s outputs.

Affected Systems

The flaw is present in the Fable Extra WordPress plugin by WPFable. All releases from the initial version up through 1.0.6 are affected, and the problem will persist until a newer, patched version is installed. Administrators who have retained a version of the plugin older than 1.0.7 (or the appropriate fix release) are at risk.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate level of severity. The EPSS score of less than 1% suggests a very low probability of widespread exploitation at the present time, and the vulnerability is not currently listed in the CISA KEV catalog. Nevertheless, the attack vector is likely remote: an attacker can deliver a crafted link or payload through any interface that the plugin renders, such as a logged‑in admin panel or a public form. If the site allows arbitrary input through the plugin, the flaw can be triggered by any visitor who accesses the injected content, making it a silent but damaging risk.

Generated by OpenCVE AI on April 30, 2026 at 20:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Fable Extra plugin to the latest available version that removes the XSS flaw.
  • If an update is not immediately possible, deactivate or uninstall the plugin to stop any further exploitation.
  • Audit any user‑generated or dynamic content that is output by the plugin and ensure it is properly escaped or sanitized to prevent future injection attacks.

Generated by OpenCVE AI on April 30, 2026 at 20:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12058 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFable Fable Extra allows DOM-Based XSS. This issue affects Fable Extra: from n/a through 1.0.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFable Fable Extra allows DOM-Based XSS. This issue affects Fable Extra: from n/a through 1.0.6. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFable Fable Extra fable-extra allows DOM-Based XSS.This issue affects Fable Extra: from n/a through <= 1.0.6.
Title WordPress Fable Extra <= 1.0.6 - Cross Site Scripting (XSS) Vulnerability WordPress Fable Extra plugin <= 1.0.6 - Cross Site Scripting (XSS) Vulnerability
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Thu, 24 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFable Fable Extra allows DOM-Based XSS. This issue affects Fable Extra: from n/a through 1.0.6.
Title WordPress Fable Extra <= 1.0.6 - Cross Site Scripting (XSS) Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:37.624Z

Reserved: 2025-04-24T14:22:16.421Z

Link: CVE-2025-46447

cve-icon Vulnrichment

Updated: 2025-04-24T19:52:13.359Z

cve-icon NVD

Status : Deferred

Published: 2025-04-24T16:15:35.817

Modified: 2026-04-23T15:30:00.450

Link: CVE-2025-46447

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T21:00:15Z

Weaknesses