Description
The Uncode Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'uncode_hl_text' and 'uncode_text_icon' shortcodes in all versions up to, and including, 2.9.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-04
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Uncode Core plugin for WordPress contains a stored cross‑site scripting vulnerability in its 'uncode_hl_text' and 'uncode_text_icon' shortcodes. Unsanitized user‑supplied attributes are rendered without escaping, allowing a contributor‑level attacker to embed arbitrary JavaScript that runs whenever anyone views the affected page. This can lead to session hijacking, defacement, or other malicious actions against site visitors.

Affected Systems

All versions of the Uncode Core plugin up to and including 2.9.4.2 are affected. The product is provided by undsgn as the Uncode Core WordPress plugin.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, and the current EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability requires authenticated access with contributor or higher privileges; the attacker does not need to exploit a memory corruption or privilege escalation bug. Because it is not listed in the CISA KEV, there are no publicly known active exploits, but the data suggests that the issue is critical for sites that allow contributors. Site owners should treat this as a moderate risk that can be mitigated by patching.

Generated by OpenCVE AI on April 21, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Uncode Core plugin to a version newer than 2.9.4.2, where the input sanitization issue has been resolved.
  • If an immediate upgrade is not possible, delete or disable the 'uncode_hl_text' and 'uncode_text_icon' shortcodes from any content before publishing.
  • Restrict contributor role privileges or implement a content approval workflow so that only trusted users can publish content containing shortcodes.

Generated by OpenCVE AI on April 21, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19930 The Uncode Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'uncode_hl_text' and 'uncode_text_icon' shortcodes in all versions up to, and including, 2.9.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Mon, 07 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 04 Jul 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Uncode Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'uncode_hl_text' and 'uncode_text_icon' shortcodes in all versions up to, and including, 2.9.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Uncode Core <= 2.9.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Undsgn Uncode
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:52:51.668Z

Reserved: 2025-06-30T23:19:41.110Z

Link: CVE-2025-6944

cve-icon Vulnrichment

Updated: 2025-07-07T14:40:54.447Z

cve-icon NVD

Status : Deferred

Published: 2025-07-04T06:15:25.203

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:00:25Z

Weaknesses