Impact
The UsersWP plugin for WordPress is vulnerable to stored cross‑site scripting via the uwp_profile and uwp_profile_header shortcodes. Insufficient input sanitization and output escaping allow an authenticated contributor or higher to inject arbitrary scripts that will execute whenever a user views a page containing the injected content. The vulnerability arises from improper handling of user‑supplied attributes, leading to script execution on both the affected user’s browser and any subsequent visitors to the page.
Affected Systems
The vulnerability affects the UsersWP – Front‑end login form, User Registration, User Profile & Members Directory plugin from the vendor stiofansisland. All plugin versions up to and including 1.2.42 are impacted. No further version details are provided.
Risk and Exploitability
The CVSS score of 6.4 indicates a moderate severity, while the EPSS score of <1% reflects a very low probability of exploitation in the wild. The issue is not listed in the CISA KEV catalog. Attackers must first authenticate with contributor-level or higher permissions and then use the frontend shortcodes to inject malicious code. Since the vulnerability only applies to users who view the compromised page, the risk remains moderate but should not be ignored for sites that rely on these shortcodes.
OpenCVE Enrichment
EUVD