Impact
Authenticated contributors with WordPress access can inject malicious JavaScript into the wpda_app shortcode because the plugin fails to sanitize or escape user‑supplied attributes. This flaw creates a stored XSS vector that executes the payload in the browsers of any visitor who views the affected page, enabling session hijacking, defacement, or the execution of other malicious actions. The weakness is identified as CWE‑79 (Improper Neutralization of Input During Web Page Generation).
Affected Systems
The vulnerability exists in the WP Data Access – App Builder for Tables, Forms, Charts, Maps & Dashboards plugin from peterschulznl in all releases up to and including 5.5.63. Sites running these versions and permitting contributor‑level or higher users can be impacted; versions 5.5.64 and later have the issue fixed.
Risk and Exploitability
The CVSS v3 score of 6.4 indicates moderate severity, while the EPSS score of less than 1% reflects a presently low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires authentication at the contributor level or higher, so the risk is constrained by the role permissions in place. Nonetheless, once an attacker has the necessary credentials, the stored XSS can be deployed immediately. Official remediation is to upgrade to 5.5.64 or newer, which restores proper input validation and output escaping; as a temporary measure, removing or disabling the wpda_app shortcode for contributors can mitigate exposure.
OpenCVE Enrichment