Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PenciDesign Penci Bookmark & Follow penci-bookmark-follow allows Reflected XSS.This issue affects Penci Bookmark & Follow: from n/a through < 2.4.
Published: 2025-11-06
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from improper neutralization of user input during web page generation in the Penci Bookmark & Follow plugin, enabling attackers to inject and execute arbitrary scripts when a victim follows a crafted link. This reflected XSS allows malicious code to run in the victim's browser, potentially leading to session hijacking, defacement, or credential theft. The weakness is identified as CWE‑79.

Affected Systems

The issue affects the WordPress Penci Bookmark & Follow plugin from all released versions prior to 2.4. Users running any of those versions are susceptible. The vulnerability range covers from the earliest release up to any version less than 2.4.

Risk and Exploitability

With a CVSS score of 7.1 the vulnerability is considered high severity, indicating significant impact even with a low exploitation probability. The EPSS score of less than 1% suggests that, at present, the likelihood of exploit activity is low, and the vulnerability is not catalogued in CISA’s KEV. Attackers could leverage the reflected XSS by crafting a malicious URL or form input and persuading a target user to visit the link, which will execute injected JavaScript within the context of the site. No complex prerequisites are required beyond the ability to influence the victim’s browser.

Generated by OpenCVE AI on April 30, 2026 at 05:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Penci Bookmark & Follow plugin to version 2.4 or later.
  • If an immediate upgrade is not possible, remove or disable the plugin until a patched version is released.
  • Regularly monitor the official plugin repository or security advisories for future updates, and apply any subsequent patches promptly.

Generated by OpenCVE AI on April 30, 2026 at 05:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 10 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PenciDesign Penci Bookmark & Follow penci-bookmark-follow allows Reflected XSS.This issue affects Penci Bookmark & Follow: from n/a through < 2.4.
Title WordPress Penci Bookmark & Follow plugin < 2.4 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:07.554Z

Reserved: 2025-06-11T16:06:50.724Z

Link: CVE-2025-49909

cve-icon Vulnrichment

Updated: 2025-11-10T19:32:29.659Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:15:54.583

Modified: 2026-04-27T20:16:16.483

Link: CVE-2025-49909

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:30:06Z

Weaknesses