Impact
The Groups WordPress plugin stores user-supplied attributes from the groups_group_info shortcode without proper sanitization or escaping, allowing an authenticated contributor or higher to store malicious scripts. These scripts are served on subsequent page loads and execute in the context of any visitor who views the page, leading to theft of credentials, session hijacking, or defacement. This weakness is classified as CWE‑79 involving client‑side injection.
Affected Systems
Any WordPress installation using the itthinx:Groups plugin version 3.10.0 or earlier. The vulnerability is present in all releases up to and including v3.10.0, and affects users with Contributor or higher privileges on the site.
Risk and Exploitability
The vulnerability has a CVSS score of 6.4, indicating medium severity. Exploit probability is very low (EPSS < 1%) and it is not listed in the CISA KEV catalog, suggesting limited public exploitation. Attackers must be authenticated and have at least Contributor access to inject content. Once executed, the stored script runs for any visitor, making the potential impact widespread across all users of the compromised site.
OpenCVE Enrichment