Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Leishman Mail Subscribe List mail-subscribe-list allows Stored XSS.This issue affects Mail Subscribe List: from n/a through <= 2.1.10.
Published: 2025-09-22
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from improper neutralization of user input during web page generation, enabling stored XSS in the WordPress Mail Subscribe List plugin. A malicious payload entered via the subscription form can be persisted and executed in other users’ browsers, potentially compromising session data, defacing content, or redirecting users. This weakness aligns with CWE‑79, indicating insecure handling of untrusted data.

Affected Systems

The Mail Subscribe List plugin developed by Richard Leishman is affected. Any installation of versions from the initial release up to and including 2.1.10 is vulnerable, regardless of the exact minor build number.

Risk and Exploitability

The CVSS score of 6.5 denotes moderate severity. With an EPSS score below 1%, the likelihood of public exploitation is low, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be any user who can submit the subscription form, allowing the attacker to inject and store malicious scripts that will be served to all subsequent visitors.

Generated by OpenCVE AI on April 30, 2026 at 01:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Mail Subscribe List plugin to version 2.1.11 or later, replacing the vulnerable code base.
  • If an upgrade is not immediately possible, implement input sanitization on the subscription form fields by configuring the plugin or adding a server‑side filter that escapes HTML before storage.
  • After remediation, review existing subscriber entries for injected scripts and clean or delete any compromised content.

Generated by OpenCVE AI on April 30, 2026 at 01:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-30629 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Leishman Mail Subscribe List allows Stored XSS. This issue affects Mail Subscribe List: from n/a through 2.1.10.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Leishman Mail Subscribe List allows Stored XSS. This issue affects Mail Subscribe List: from n/a through 2.1.10. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Leishman Mail Subscribe List mail-subscribe-list allows Stored XSS.This issue affects Mail Subscribe List: from n/a through <= 2.1.10.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Tue, 23 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Richard Leishman
Richard Leishman mail Subscribe List
Wordpress
Wordpress wordpress
Vendors & Products Richard Leishman
Richard Leishman mail Subscribe List
Wordpress
Wordpress wordpress

Mon, 22 Sep 2025 18:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Leishman Mail Subscribe List allows Stored XSS. This issue affects Mail Subscribe List: from n/a through 2.1.10.
Title WordPress Mail Subscribe List Plugin <= 2.1.10 - Cross Site Scripting (XSS) Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Richard Leishman Mail Subscribe List
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-12T01:03:42.853Z

Reserved: 2025-08-22T11:37:50.459Z

Link: CVE-2025-58018

cve-icon Vulnrichment

Updated: 2025-09-23T15:41:06.641Z

cve-icon NVD

Status : Deferred

Published: 2025-09-22T19:16:03.897

Modified: 2026-04-23T15:33:14.807

Link: CVE-2025-58018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T01:15:24Z

Weaknesses