Impact
The WP Scriptcase plugin contains a stored cross‑site scripting flaw triggered by the unfiltered 'url' parameter. When a contributor‑level user submits a malicious value in this field, the script is persisted and later rendered unescaped in page content. This enables the attacker to run scripts in the browser context of any user who visits the affected page. The weakness is a classic input validation and output encoding failure (CWE‑79).
Affected Systems
WordPress sites running the WP Scriptcase plugin from vendor softmus, all releases up to and including version 2.0.0. The flaw is present in every installation of the plugin in this range, regardless of WordPress version.
Risk and Exploitability
The CVSS score of 6.4 indicates a medium severity risk. The EPSS score of less than 1 % reflects a low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers need authenticated access to the WordPress site with at least contributor privileges; the flaw is exploited by submitting a crafted URL parameter that is later stored and executed when the page is viewed by any visitor.
OpenCVE Enrichment
EUVD