Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeff Starr Head Meta Data head-meta-data allows Stored XSS.This issue affects Head Meta Data: from n/a through <= 20250327.
Published: 2025-11-21
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper neutralization of input during web page generation that allows stored cross‑site scripting (XSS) in the Head Meta Data plugin for WordPress. An attacker can store malicious script content that the plugin subsequently outputs unfiltered into the head section of the site’s pages, resulting in arbitrary client‑side script execution for any visitor. The weakness is classified as CWE‑79.

Affected Systems

The product affected is Jeff Starr Head Meta Data, a WordPress plugin. All releases from the product’s initial launch up to and including version 20250327 are affected, as defined by the CNA. No other vendors or product variants are listed in the current CVE entry.

Risk and Exploitability

The CVSS score is 5.9, indicating a moderate risk level. The EPSS score is below 1 %, showing a very low likelihood of exploitation at present. The vulnerability is not included in the CISA KEV catalog. A successful exploit would require an attacker to inject malicious content that the plugin stores and that is later rendered in pages; the script would then execute in the browsers of any visitor to those pages.

Generated by OpenCVE AI on April 29, 2026 at 22:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Head Meta Data plugin to the latest version available from the vendor, as all releases up through 20250327 are affected.
  • If an immediate update is not possible, deactivate or uninstall the Head Meta Data plugin to remove the vulnerable input path.
  • Add a Content Security Policy header that restricts execution of inline scripts to mitigate potential XSS impact if the plugin cannot be removed.

Generated by OpenCVE AI on April 29, 2026 at 22:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Jeff Starr
Jeff Starr head Meta Data
Wordpress
Wordpress wordpress
Vendors & Products Jeff Starr
Jeff Starr head Meta Data
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 12:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeff Starr Head Meta Data head-meta-data allows Stored XSS.This issue affects Head Meta Data: from n/a through <= 20250327.
Title WordPress Head Meta Data plugin <= 20250327 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Jeff Starr Head Meta Data
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:16.531Z

Reserved: 2025-11-21T11:20:58.863Z

Link: CVE-2025-66081

cve-icon Vulnrichment

Updated: 2025-11-21T16:35:54.230Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T13:15:48.977

Modified: 2026-04-27T18:16:34.040

Link: CVE-2025-66081

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:00:14Z

Weaknesses