Impact
The WP Easy FAQs plugin is vulnerable to a stored cross‑site scripting flaw triggered through the WP_EASY_FAQ shortcode. The plugin fails to sanitize or escape user‑supplied attributes, allowing an attacker with author‑level or higher access to embed arbitrary JavaScript. When the affected page is viewed, the malicious script runs in the victim’s browser.
Affected Systems
Any WordPress installation using the wen‑solutions WP Easy FAQs plugin up to and including version 1.0.5 is affected. The vulnerability exists in all prior releases as well.
Risk and Exploitability
The CVSS score of 6.4 rates this vulnerability as moderate severity. However, the EPSS score is below 1 %, indicating a low likelihood of exploitation at this time. It is not listed in the CISA KEV catalog. The attack vector requires an authenticated user with author privileges to insert a page containing the malicious shortcode. Once injected, the script executes for all users who view that page.
OpenCVE Enrichment
EUVD