Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DeBAAT WP-GraphViz wp-graphviz allows DOM-Based XSS.This issue affects WP-GraphViz: from n/a through <= 1.5.1.
Published: 2025-09-05
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WP‑GraphViz plugin for WordPress contains an improper neutralization of input during web page generation. Based on the description, the likely attack vector is an attacker crafting a malicious payload that is reflected through the browser’s DOM. An attacker can craft a malicious payload that is reflected through the browser’s DOM, resulting in a DOM‑based XSS flaw. When a user visits a page containing the vulnerable input, arbitrary JavaScript can execute in the user’s browser. This could lead to session hijacking, credential theft, or malicious content injection, affecting confidentiality and integrity of the user session.

Affected Systems

The flaw is present in the DeBAAT WP‑GraphViz plugin versions up to and including 1.5.1. All WordPress sites installing any of these affected releases of the plugin are vulnerable.

Risk and Exploitability

Based on the description, the likely attack vector is an attacker persuading a user to visit a malicious URL or click a link that includes the crafted payload. The CVSS score is 6.5, indicating moderate severity. The EPSS score of less than 1% suggests a low probability that the flaw is being exploited in the wild, and it does not appear in the CISA KEV catalog. Exploitation requires a user to load a page that includes the malicious payload, and the attacker does not need additional pre‑conditions beyond convincing a victim to load a crafted URL or click a link. Because it is a browser‑side vulnerability, it cannot lead to remote code execution on the server but can use the browser context maliciously.

Generated by OpenCVE AI on April 30, 2026 at 07:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP‑GraphViz plugin to a version newer than 1.5.1.
  • If an immediate update is not possible, disable or delete the plugin to eliminate the risk.
  • Consider applying site‑wide content security policies to restrict JavaScript execution from untrusted sources.

Generated by OpenCVE AI on April 30, 2026 at 07:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26907 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DeBAAT WP-GraphViz allows DOM-Based XSS. This issue affects WP-GraphViz: from n/a through 1.5.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DeBAAT WP-GraphViz allows DOM-Based XSS. This issue affects WP-GraphViz: from n/a through 1.5.1. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DeBAAT WP-GraphViz wp-graphviz allows DOM-Based XSS.This issue affects WP-GraphViz: from n/a through <= 1.5.1.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Fri, 05 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 05 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DeBAAT WP-GraphViz allows DOM-Based XSS. This issue affects WP-GraphViz: from n/a through 1.5.1.
Title WordPress WP-GraphViz Plugin <= 1.5.1 - Cross Site Scripting (XSS) Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-13T00:19:07.837Z

Reserved: 2025-09-05T10:50:06.171Z

Link: CVE-2025-58870

cve-icon Vulnrichment

Updated: 2025-09-05T14:48:54.657Z

cve-icon NVD

Status : Deferred

Published: 2025-09-05T14:16:03.373

Modified: 2026-04-23T15:33:47.740

Link: CVE-2025-58870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T07:15:31Z

Weaknesses