Description
The Mikado Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-09-09
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via Shortcode
Action: Apply Patch
AI Analysis

Impact

The Mikado Core plugin for WordPress contains a stored cross‑site scripting vulnerability that is triggered by maliciously crafted shortcodes. When a user with contributor or higher privileges submits content containing user‑supplied attributes that are not properly sanitized or escaped, the payload is saved into the page. Any visitor who loads the affected page will have the malicious script executed in their browser, allowing the attacker to steal information, hijack sessions, or deface the site. The weakness is a classic input validation error (CWE‑79).

Affected Systems

All installations of Mikado Core version 1.5.2 or earlier are affected. The vulnerability applies to any WordPress site that uses this plugin and permits contributors or higher roles to insert or edit page content. No specific patch version is listed in the supplied data, so administrators should verify that the plugin has been updated beyond 1.5.2.

Risk and Exploitability

The CVSS score of 6.4 indicates a medium severity impact. The EPSS score of < 1% suggests that exploitation is unlikely but still possible, especially against sites with many users. The vulnerability is not listed in the CISA KEV catalog. The attack vector requires an authenticated user with contributor permissions, so any compromised contributor account can serve as a foothold to inject the payload. If an attacker controls such an account, the malicious script will run for all site visitors who view the affected page.

Generated by OpenCVE AI on April 20, 2026 at 19:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mikado Core to the latest version, ensuring it is newer than 1.5.2.
  • If an upgrade is not immediately possible, remove or disable the use of shortcodes that accept user input on public‑facing pages.
  • Apply WordPress content sanitization filters or plugins that prevent execution of embedded scripts in user‑generated content.

Generated by OpenCVE AI on April 20, 2026 at 19:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 09 Sep 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 09 Sep 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Mikado Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Mikado Core <= 1.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:23:32.735Z

Reserved: 2025-08-15T09:51:32.031Z

Link: CVE-2025-9058

cve-icon Vulnrichment

Updated: 2025-09-09T19:25:46.679Z

cve-icon NVD

Status : Deferred

Published: 2025-09-09T06:15:34.237

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:45:15Z

Weaknesses