Impact
The WordPress WP Tactical Popup plugin allows attacker‑supplied input to be reflected in a generated web page without proper neutralization. This improper handling enables injection of arbitrary JavaScript, which can run with the victim’s browser privileges when the affected content is viewed. The flaw is classified as CWE‑79 and can potentially allow attackers to steal credentials, deface pages, or redirect users to malicious sites.
Affected Systems
Any WordPress installation that has the Arevico WP Tactical Popup plugin with a version numbered 1.1 or earlier is affected. Sites running a later version are not impacted by this specific vulnerability.
Risk and Exploitability
The CVSS base score of 7.1 indicates moderate to high severity. The EPSS score of <1% suggests that exploitation is unlikely in the wild, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it can be inferred that the attack vector requires a crafted URL or form input that the plugin echoes unmodified; therefore, the attack is browser‑based and requires victim interaction to execute the injected script.
OpenCVE Enrichment