Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Basticom Basticom Framework basticom-framework allows Stored XSS.This issue affects Basticom Framework: from n/a through <= 1.5.2.
Published: 2025-12-24
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS Vulnerability
Action: Patch
AI Analysis

Impact

The Basticom Framework plugin for WordPress has been found to improperly neutralize user input, resulting in a stored cross‑site scripting flaw. This type of vulnerability allows an attacker to embed malicious script that is saved in the site's content and subsequently executed whenever a page containing that content is viewed. Based on the description, it is inferred that an attacker who can insert or modify stored data could hijack user sessions, deface pages, or trigger unauthorized actions on behalf of the visitor, all of which follow from the nature of stored XSS and correspond to CWE‑79.

Affected Systems

Any WordPress installation that has the Basticom Framework plugin up to and including version 1.5.2 is vulnerable. The weakness applies to all prior builds of the plugin, regardless of the user role or site configuration, meaning that any site owner using an affected version is at risk.

Risk and Exploitability

The CVSS base score of 5.9 reflects a moderate severity, and the EPSS score of less than 1 % indicates a low likelihood of widespread exploitation at present. Attackers can exploit the flaw remotely through the web interface by creating or editing content that will be stored and rendered to other visitors; no special credentials or network access are required. The vulnerability is not listed in the CISA KEV catalog, but its ability to compromise confidentiality, integrity, or availability of user interactions warrants timely remediation.

Generated by OpenCVE AI on April 28, 2026 at 10:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Basticom Framework plugin to a release newer than 1.5.2 to eliminate the stored XSS defect.
  • If an upgrade cannot be performed immediately, uninstall or disable the plugin to remove the attack surface.
  • Deploy a Web Application Firewall rule or enforce a content security policy that blocks the execution of inline scripts originating from stored content, providing a temporary safety net.

Generated by OpenCVE AI on April 28, 2026 at 10:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Basticom
Basticom framework
Wordpress
Wordpress wordpress
Vendors & Products Basticom
Basticom framework
Wordpress
Wordpress wordpress

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Basticom Basticom Framework basticom-framework allows Stored XSS.This issue affects Basticom Framework: from n/a through <= 1.5.2.
Title WordPress Basticom Framework plugin <= 1.5.2 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Basticom Framework
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:22.853Z

Reserved: 2025-12-09T16:46:50.745Z

Link: CVE-2025-67629

cve-icon Vulnrichment

Updated: 2025-12-24T18:55:27.892Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:19.070

Modified: 2026-04-27T18:16:47.310

Link: CVE-2025-67629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:15:28Z

Weaknesses