Description
The WPS Visitor Counter WordPress plugin through 1.4.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers.
Published: 2025-12-13
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The WPS Visitor Counter WordPress plugin up to version 1.4.8 fails to escape the $_SERVER['REQUEST_URI'] variable before it is included in an HTML attribute. This flaw allows an attacker to inject arbitrary JavaScript that is reflected back to the victim when the URL is visited. The root cause is improper input validation, a common cause for XSS vulnerabilities (CWE‑79).

Affected Systems

The affected product is the WordPress plugin WPS Visitor Counter, any installation of any version up to and including 1.4.8. Websites that have installed these versions are potentially vulnerable, independent of the host or domain. No other vendors or products were listed in the CNA data.

Risk and Exploitability

The CVSS score of 5.8 classifies the vulnerability as moderate severity. The EPSS score of less than 1 percent indicates a very low probability that the flaw is being actively exploited in the wild. The vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog. Attackers would need to create a malicious URL that includes unescaped characters in the request URI, publish or otherwise distribute that link, and convince a victim to click it. The exploitation is limited to the victim’s browser session and does not modify server state or affect other users.

Generated by OpenCVE AI on April 28, 2026 at 18:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WPS Visitor Counter plugin to a version newer than 1.4.8 once it becomes available, as the fix removes the unsanitized request‑URI output.
  • If an immediate upgrade cannot be performed, temporarily deactivate or completely uninstall the plugin to eliminate the reflection vector.
  • Apply a Content Security Policy that forbids inline scripts or enforce at least one of the following: disallow scripts with "unsafe-inline" or add a nonce; or use a WordPress security plugin to sanitize URL parameters before rendering.

Generated by OpenCVE AI on April 28, 2026 at 18:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Thu, 02 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Description The WPS Visitor Counter Plugin WordPress plugin through 1.4.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers. The WPS Visitor Counter WordPress plugin through 1.4.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers.

Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 13 Dec 2025 06:15:00 +0000

Type Values Removed Values Added
Description The WPS Visitor Counter Plugin WordPress plugin through 1.4.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers.
Title WPS Visitor Counter Plugin <= 1.4.8 - Reflected XSS via $_SERVER['REQUEST_URI']
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-02T12:39:56.139Z

Reserved: 2025-08-18T13:56:12.969Z

Link: CVE-2025-9116

cve-icon Vulnrichment

Updated: 2025-12-13T22:55:07.232Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:56.747

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9116

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:45:15Z

Weaknesses