Description
The kallyas theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 4.23.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-01
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS
Action: Apply Patch
AI Analysis

Impact

The KALLYAS WordPress theme allows stored cross‑site scripting via plugin shortcodes due to insufficient sanitization of user‑supplied attributes. An authenticated user with contributor or higher privileges can inject arbitrary JavaScript into pages, which will execute whenever any visitor loads the affected page. This enables attacks such as session hijacking, cookie theft, defacement, or malware delivery targeting site visitors.

Affected Systems

The vulnerability affects the KALLYAS WordPress theme released by hogash, specifically versions up to and including 4.23.0. WordPress sites that have installed any of these theme versions are at risk. The hit list extends to all customers using the theme on their WordPress installations.

Risk and Exploitability

The CVSS score of 6.4 categorises the bug as a moderate‑severity stored XSS. The EPSS score of less than 1 % suggests that active exploitation has been rare to date, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an authenticated contributor‑level account; the attacker must first submit or edit content containing the malicious shortcode, after which any user who visits the page will have the injected script executed. Because the prerequisite is a legitimate login, this is a moderate‑risk threat that can be mitigated by disabling contributor privileges or restricting shortcode usage until the theme is updated.

Generated by OpenCVE AI on April 21, 2026 at 01:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the KALLYAS theme to version 4.24.0 or later, where the XSS issue has been remediated.
  • If an upgrade is not immediately possible, disable contributor or higher‑level accounts from adding or editing content that uses the vulnerable shortcodes, or revoke those users' permission to edit the affected pages.
  • As a temporary measure, apply output filtering or content sanitization to the custom shortcode attributes to escape HTML before rendering.

Generated by OpenCVE AI on April 21, 2026 at 01:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Hogash
Hogash kallyas
Wordpress
Wordpress wordpress
Vendors & Products Hogash
Hogash kallyas
Wordpress
Wordpress wordpress

Sat, 01 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The kallyas theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 4.23.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Kallyas <= 4.23.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Hogash Kallyas
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:36.409Z

Reserved: 2025-07-01T20:55:18.023Z

Link: CVE-2025-6988

cve-icon Vulnrichment

Updated: 2025-11-03T13:10:34.300Z

cve-icon NVD

Status : Deferred

Published: 2025-11-01T08:15:32.403

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6988

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:00:12Z

Weaknesses