Impact
The Use‑your‑Drive plugin for WordPress is susceptible to a stored cross‑site scripting flaw. The vulnerability arises from the plugin’s failure to sanitize and escape the 'title' parameter in file metadata. An attacker can craft a malicious title containing executable JavaScript, which the plugin embeds directly into words generated by the plugin without proper filtering. When any user views the page containing the uploaded file, the injected script runs in that user’s browser, potentially stealing session cookies, defacing content, or redirecting the user to malicious sites. This flaw specifically maps to CWE‑79, representing an input that is not correctly validated or escaped.
Affected Systems
The flaw is present in the WP Cloud Plugins (deleeuw) Use‑your‑Drive | Google Drive plugin for WordPress versions up to and including 3.3.1. Users running these versions – regardless of the overall WordPress installation or hosting environment – are susceptible if they have the plugin installed and a file‑upload shortcode active on a publicly accessible post.
Risk and Exploitability
The CVSS score of 7.2 classifies the vulnerability as high severity, yet the EPSS score is less than 1%, indicating a low current probability of exploitation in the wild. The flaw is not listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation requires only the ability to upload a file via the plugin’s shortcode, and the weakness can be leveraged by unauthenticated users if the upload interface is publicly exposed. As a result, the risk window exists for any environment that exposes the upload functionality to the public.
OpenCVE Enrichment
EUVD