Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sarah Giles Dynamic User Directory dynamic-user-directory allows Stored XSS.This issue affects Dynamic User Directory: from n/a through <= 2.3.
Published: 2025-10-27
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the Dynamic User Directory plugin. The vulnerability permits an attacker to embed malicious JavaScript that is persisted in the plugin’s data store and subsequently rendered to any user who views the affected page. When the page is displayed, the injected code runs in the victim’s browser, potentially allowing the attacker to modify the page’s appearance or interact with the browser in other unintended ways.

Affected Systems

WordPress sites that incorporate the Sarah Giles Dynamic User Directory plugin with a version of 2.3 or earlier are affected. Any installation using this plugin range is at risk because the plugin does not properly neutralize input when generating web pages.

Risk and Exploitability

The CVSS score of 5.9 identifies the flaw as having moderate impact, while the EPSS score of < 1 % indicates a low likelihood of exploitation. It is not listed in the CISA KEV catalog. Based on the description it is inferred that an attacker could inject malicious script into a directory entry or other value that the plugin records; once stored, the code would be served to any visitor of the page containing the entry. No additional specialized privileges or conditions are described in the advisory, so the flaw is potentially exploitable through any input field that the plugin accepts.

Generated by OpenCVE AI on April 29, 2026 at 23:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Dynamic User Directory plugin to a version newer than 2.3.
  • If an update is not available, sanitize all user‑generated content before it is stored or rendered by the plugin, ensuring that no executable scripts are retained.
  • Deploy a web application firewall or enable a site‑wide Content Security Policy that blocks the execution of inline scripts on the front‑end pages.

Generated by OpenCVE AI on April 29, 2026 at 23:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Sarah Giles
Sarah Giles dynamic User Directory
Wordpress
Wordpress wordpress
Vendors & Products Sarah Giles
Sarah Giles dynamic User Directory
Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sarah Giles Dynamic User Directory dynamic-user-directory allows Stored XSS.This issue affects Dynamic User Directory: from n/a through <= 2.3.
Title WordPress Dynamic User Directory plugin <= 2.3 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Sarah Giles Dynamic User Directory
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:07.590Z

Reserved: 2025-10-24T14:25:13.438Z

Link: CVE-2025-62982

cve-icon Vulnrichment

Updated: 2025-10-27T13:23:45.468Z

cve-icon NVD

Status : Deferred

Published: 2025-10-27T02:15:59.080

Modified: 2026-04-27T17:16:39.797

Link: CVE-2025-62982

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:30:22Z

Weaknesses