Description
The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘vodsChannel’ parameter in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-09-06
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The plugin contains a stored cross‑site scripting flaw that arises when the vodsChannel parameter is not properly sanitized or escaped by the plugin's rendering routine. Because the input is stored in the database, an authenticated user with contributor or higher privileges can embed malicious script tags that will run in the context of any visitor who lands on a page that displays the injected value. This defect satisfies CWE-79 and gives an attacker code‑execution capability in the victim's browser, potentially enabling session hijacking, credential theft, or defacement of site content. No elevation of privilege is required beyond the Contributor role; the vulnerability is purely a client‑side injection problem.

Affected Systems

Affected systems are installations of the StreamWeasels Kick Integration WordPress plugin version 1.1.5 and any earlier releases. Administrators should review the version used on their WordPress sites and verify whether the vodsChannel parameter is exposed or used. The plugin is distributed via the WordPress plugin repository and is supported by streamweasels. No specific operating system or PHP version constraints are given; the flaw exists in all WordPress environments that run the vulnerable plugin.

Risk and Exploitability

The CVSS score is 6.4, indicating a medium severity risk. The EPSS score is below 1 %, implying a very low probability of exploitation in the wild at the moment. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a logged‑in user with Contributor or higher access, so while remote attackers cannot directly exploit it, anyone who gains Contributor rights (e.g., through phishing or credential compromise) could abuse the flaw. The lack of user‑facing controls means that the window for compromise is limited to authenticated actors, but once compromised the affected user’s session can be hijacked or further malicious content injected.

Generated by OpenCVE AI on April 21, 2026 at 03:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the StreamWeasels Kick Integration plugin to the latest released version, which removes the unescaped vodsChannel parameter handling.
  • Restrict Contributor‑level access on the WordPress site or remove any contributor accounts that are no longer needed, thereby eliminating the privilege required to inject the payload.
  • Apply a Web Application Firewall rule or content‑filtering plugin that blocks the execution of inline JavaScript or injected script tags in rendered pages.

Generated by OpenCVE AI on April 21, 2026 at 03:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 08 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 07 Sep 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Streamweasels
Streamweasels kick Integration
Wordpress
Wordpress wordpress
Vendors & Products Streamweasels
Streamweasels kick Integration
Wordpress
Wordpress wordpress

Sat, 06 Sep 2025 03:45:00 +0000

Type Values Removed Values Added
Description The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘vodsChannel’ parameter in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title StreamWeasels Kick Integration <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via vodsChannel Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Streamweasels Kick Integration
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:50:41.577Z

Reserved: 2025-08-25T13:52:52.838Z

Link: CVE-2025-9442

cve-icon Vulnrichment

Updated: 2025-09-08T20:17:39.148Z

cve-icon NVD

Status : Deferred

Published: 2025-09-06T04:16:07.793

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9442

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:15:16Z

Weaknesses