Description
The ACF Onyx Poll plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘class’ parameter in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-13
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Immediate Patch
AI Analysis

Impact

In the ACF Onyx Poll WordPress plugin, the class parameter is not properly sanitized or escaped before being stored. An authenticated author with Contributor level or higher can place arbitrary JavaScript into the poll content. When another site visitor accesses the poll page, the injected script runs in their browser, enabling session hijacking, data theft, or defacement. The vulnerability is a classic stored XSS flaw (CWE‑79).

Affected Systems

The flaw affects the ACF Onyx Poll plugin produced by Andremacola, used on any WordPress installation. All releases up to and including version 1.1.9 are vulnerable. WordPress sites that have installed these versions, and have users with Contributor or higher roles, are impacted.

Risk and Exploitability

With a CVSS score of 6.4, this vulnerability is moderate but still noteworthy. The EPSS score of less than 1 % signals that exploitation is currently rare, and the flaw is not listed in the CISA KEV catalog. Attackers must have login credentials and a role of Contributor or above, which is easier to obtain than administrative rights. Once a poll page is viewed, any user in the browser receives the injected code, creating a widespread exposure. Even though the exploit probability is low, the potential for user session compromise and defacement warrants prompt attention.

Generated by OpenCVE AI on April 21, 2026 at 20:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the ACF Onyx Poll plugin to version 1.2.0 or newer to eliminate the unsanitized class handling.
  • Remove or disable the poll block on sites where it is not required to reduce exposure.
  • If upgrading is not immediately possible, consult a security team to evaluate whether poll content can be removed or the class field sanitized.

Generated by OpenCVE AI on April 21, 2026 at 20:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18236 The ACF Onyx Poll plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘class’ parameter in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00034}

epss

{'score': 0.00039}


Fri, 13 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
Description The ACF Onyx Poll plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘class’ parameter in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title ACF Onyx Poll <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via class Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:56.353Z

Reserved: 2025-06-06T21:24:35.248Z

Link: CVE-2025-5841

cve-icon Vulnrichment

Updated: 2025-06-13T14:03:25.845Z

cve-icon NVD

Status : Deferred

Published: 2025-06-13T03:15:52.457

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-5841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:30:27Z

Weaknesses