Impact
The Epic Bootstrap Buttons plugin for WordPress contains an input validation flaw in the icol parameter. Attackers who can log in with Contributor or higher roles can embed arbitrary JavaScript payloads that are stored and rendered on subsequent page loads. This stored cross‑site scripting (CWE‑79) allows malicious code to run in the browsers of any visitor to the affected page, potentially exposing session cookies, defacing content, or redirecting users to phishing sites. The vulnerability is purely an input sanitization failure without additional privilege escalation.
Affected Systems
WordPress sites that have the Epic Bootstrap Buttons plugin installed in any version up to and including 1.0. The CVE specifies only these versions; newer releases, if available, are not known to be affected. Administrators should check the plugin’s version and confirm whether any installed instance falls within the vulnerable range.
Risk and Exploitability
The CVSS score of 6.4 indicates moderate severity. The EPSS score of < 1% denotes a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The risk remains moderate but the likelihood of real‑world exploitation remains low.
OpenCVE Enrichment
EUVD