Description
The Easy Plugin Stats plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'eps' shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-10-11
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Authenticated)
Action: Patch Now
AI Analysis

Impact

The Easy Plugin Stats plugin used in WordPress is affected by a stored cross‑site scripting flaw that stems from the 'eps' shortcode not properly sanitizing or escaping user‑supplied attributes. An attacker who has contributor or higher level permissions can embed malicious script code into a page that contains the shortcode. When any user views that page the script runs in the victim’s browser, allowing possible defacement, theft of session information, or other malicious actions.

Affected Systems

WordPress installations running any version of the Easy Plugin Stats plugin from its initial release through version 2.0.1 are vulnerable. The product is distributed by ndiego and is commonly found on public sites that use the plugin to display statistics. The vulnerability affects all installations regardless of WordPress configuration, as it relies solely on the plugin’s shortcode rendering.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, and the EPSS model indicates an exploitation probability of less than 1%. The flaw has not been listed in the CISA Known Exploited Vulnerabilities catalog. An attacker must first have authenticated contributor‑level access; a single malicious user can embed the exploit and wait for any visitor or administrator to load the infected page. While the EPSS suggests low sporadic attacks, the fact that the attack requires only local permissions means that compromised or malicious contributors could abuse the flaw to impact any site using the plugin.

Generated by OpenCVE AI on April 22, 2026 at 14:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Easy Plugin Stats plugin to the latest version, removing all versions <= 2.0.1 from the site.
  • If an update is not immediately available, temporarily disable or delete the plugin and restrict contributor access until an update is installed.
  • Reduce contributor‑level accounts to the fewest necessary, so that only trusted users can add or edit content that uses the shortcode, and enforce stricter role‑based restrictions for content containing the plugin shortcode.

Generated by OpenCVE AI on April 22, 2026 at 14:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 14 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 11 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
Description The Easy Plugin Stats plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'eps' shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Easy Plugin Stats <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:15.447Z

Reserved: 2025-07-14T17:41:48.754Z

Link: CVE-2025-7652

cve-icon Vulnrichment

Updated: 2025-10-14T20:13:48.782Z

cve-icon NVD

Status : Deferred

Published: 2025-10-11T10:15:43.823

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7652

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:15:20Z

Weaknesses