Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TouchOfTech Draft Notify draft-notify allows Stored XSS.This issue affects Draft Notify: from n/a through <= 1.5.
Published: 2025-12-24
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via Draft Notify
Action: Upgrade
AI Analysis

Impact

The Draft Notify plugin for WordPress contains a stored cross‑site scripting vulnerability that arises from improper neutralization of user input when generating web pages. This flaw allows malicious scripts to be saved in stored data and later served to any visitor of the site when the affected content is displayed. The weakness is a classic example of CWE‑79 and may lead to client‑side exploitation such as session hijacking, defacement, or cookie theft, depending on the attacker’s payload. Based on the description, it is inferred that the injection vector involves a form or interface provided by the plugin, where input is collected and persisted without adequate sanitization.

Affected Systems

WordPress sites that install the Draft Notify plugin version 1.5 or earlier from TouchOfTech are impacted. All builds prior to 1.5, including the initial release, carry the flaw. The vulnerability is independent of specific WordPress core or theme versions. Administrators and editors who use the plugin’s content creation features can enable the vulnerability, but the presence of the issue does not depend on particular roles.

Risk and Exploitability

The EPSS score of less than 1 % suggests that the likelihood of wide‑scale exploitation is currently low, and the security bulletin does not list the flaw in the CISA KEV catalog, indicating no high‑profile attacks are known. The CVSS score of 5.9 indicates a medium severity, reflecting the potential for moderate impact on client‑side confidentiality, integrity and availability through stored XSS. Because the issue is a stored XSS, the attack surface exists whenever data entered via the plugin is rendered to users; the operator of the site can observe the effect of malicious scripts executed in users’ browsers. While the description does not explicitly state the required attack vector, it is inferred that the vulnerability is exploitable by authenticated users who can submit or edit content through the plugin’s interface.

Generated by OpenCVE AI on April 29, 2026 at 02:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Draft Notify plugin to a version newer than 1.5 to eliminate the XSS issue.
  • If a quick upgrade is not feasible, temporarily deactivate or delete the Draft Notify plugin so that no further data can be stored and the script vector is removed.
  • Apply a strict Content‑Security‑Policy that blocks inline script execution on the site to mitigate potential XSS victims.

Generated by OpenCVE AI on April 29, 2026 at 02:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TouchOfTech Draft Notify draft-notify allows Stored XSS.This issue affects Draft Notify: from n/a through <= 1.5.
Title WordPress Draft Notify plugin <= 1.5 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:22.897Z

Reserved: 2025-12-09T16:46:50.744Z

Link: CVE-2025-67627

cve-icon Vulnrichment

Updated: 2025-12-24T18:55:50.885Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:18.823

Modified: 2026-04-27T18:16:47.043

Link: CVE-2025-67627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:45:35Z

Weaknesses