Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darren Cooney Ajax Load More ajax-load-more allows Stored XSS.This issue affects Ajax Load More: from n/a through <= 7.3.1.2.
Published: 2025-05-07
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Ajax Load More plugin contains improper neutralization of input during web page generation, creating a stored XSS flaw that permits an attacker to inject and activate malicious script in the browser of any user who views a page rendered by the plugin. The vulnerability is a classic client‑side code injection identified as CWE‑79. The impact is that an attacker can execute arbitrary JavaScript in the victim’s browser, potentially enabling credential theft, session hijacking, site defacement, or delivery of malware. All sites that use the plugin are exposed because the injected script will run for every visitor who encounters the affected content.

Affected Systems

The affected product is the WordPress plugin Ajax Load More, developed by Darren Cooney. Versions from the earliest release through 7.3.1.2 are vulnerable. WordPress sites that have this plugin installed and activated, especially those that accept user‑supplied content processed by the plugin, are at risk.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. An EPSS score of less than 1% suggests a very low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The likely attack path is through user‑controllable input that the plugin stores and later renders without proper sanitization, so an attacker can craft malicious payloads that are persistently executed for any viewer of the affected page. Successful exploitation would allow code execution in the victim’s browser context.

Generated by OpenCVE AI on April 30, 2026 at 13:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ajax Load More to a version newer than 7.3.1.2.
  • If an upgrade cannot be performed immediately, deactivate the plugin until a patched release is available.
  • Ensure that any user‑supplied data passed to the plugin is fully sanitized or otherwise filtered to guarantee that scripts cannot be stored and later executed.

Generated by OpenCVE AI on April 30, 2026 at 13:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13754 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darren Cooney Ajax Load More allows Stored XSS. This issue affects Ajax Load More: from n/a through 7.3.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darren Cooney Ajax Load More allows Stored XSS. This issue affects Ajax Load More: from n/a through 7.3.1. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darren Cooney Ajax Load More ajax-load-more allows Stored XSS.This issue affects Ajax Load More: from n/a through <= 7.3.1.2.
Title WordPress Ajax Load More <= 7.3.1 - Cross Site Scripting (XSS) Vulnerability WordPress Ajax Load More plugin <= 7.3.1.2 - Cross Site Scripting (XSS) Vulnerability
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00034}

epss

{'score': 0.00039}


Mon, 12 May 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Connekthq
Connekthq ajax Load More
CPEs cpe:2.3:a:connekthq:ajax_load_more:*:*:*:*:*:wordpress:*:*
Vendors & Products Connekthq
Connekthq ajax Load More

Thu, 08 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darren Cooney Ajax Load More allows Stored XSS. This issue affects Ajax Load More: from n/a through 7.3.1.
Title WordPress Ajax Load More <= 7.3.1 - Cross Site Scripting (XSS) Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Connekthq Ajax Load More
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:47.343Z

Reserved: 2025-05-07T10:44:48.425Z

Link: CVE-2025-47630

cve-icon Vulnrichment

Updated: 2025-05-08T15:17:46.798Z

cve-icon NVD

Status : Modified

Published: 2025-05-07T15:16:16.243

Modified: 2026-04-23T15:30:38.540

Link: CVE-2025-47630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T13:30:15Z

Weaknesses