Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWave Hide My WP hide_my_wp allows Reflected XSS.This issue affects Hide My WP: from n/a through <= 6.2.12.
Published: 2026-01-22
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

The deficiency in Hide My WP is improper handling of user‑supplied input when generating a page. An attacker can embed malicious JavaScript in a crafted URL so that, when a victim clicks the link, the script runs in the victim’s browser under the site’s origin. While the description does not explicitly state the payload consequences, it is likely that the attacker can use the script to steal cookies, hijack sessions, deface content, or redirect users to phishing sites.

Affected Systems

WordPress sites that have the Hide My WP plugin installed, versions up to 6.2.12. The plugin is maintained by wpWave and is used to control visibility of content; the vulnerability does not affect the WordPress core itself.

Risk and Exploitability

The CVSS score of 7.1 indicates a moderate to high severity, while an EPSS of <1% denotes a low probability of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. It is most likely exploitable via a reflected XSS attack in which an attacker convinces a user to visit a specially crafted link. When exploited, the impact is confined to the victim’s browser, but the attacker can compromise the user’s session and access any content the user could reach.

Generated by OpenCVE AI on April 28, 2026 at 18:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Hide My WP to the latest version (>=6.2.13) to remove the XSS code path.
  • If an immediate upgrade is not possible, validate and sanitize any user input handled by Hide My WP, ensuring that reflected parameters are properly escaped or filtered.
  • Deploy a Web Application Firewall rule or apply a content‑security policy to block the injection of script content on the affected pages.
  • Monitor access logs for suspicious GET parameters and attempts to execute inline JavaScript in the URLs.

Generated by OpenCVE AI on April 28, 2026 at 18:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Fri, 23 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpwave
Wpwave hide My Wp
Vendors & Products Wordpress
Wordpress wordpress
Wpwave
Wpwave hide My Wp

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWave Hide My WP hide_my_wp allows Reflected XSS.This issue affects Hide My WP: from n/a through <= 6.2.12.
Title WordPress Hide My WP plugin <= 6.2.12 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Wordpress Wordpress
Wpwave Hide My Wp
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:36.586Z

Reserved: 2025-12-29T11:19:21.660Z

Link: CVE-2025-69098

cve-icon Vulnrichment

Updated: 2026-01-23T21:11:35.221Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:22.563

Modified: 2026-04-27T20:16:27.377

Link: CVE-2025-69098

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:15:37Z

Weaknesses