Description
The FlatPM – Ad Manager, AdSense and Custom Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'rank_math_description' custom field in all versions up to, and including, 3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-01-20
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows an authenticated user with contributor or higher level access to inject arbitrary JavaScript through the rank_math_description custom field. When the injected content is displayed, the script executes in the browsers of anyone who visits the affected page. Typical XSS exploitation could involve actions such as stealing session data, defacing content, or redirecting users to malicious sites; these outcomes are inferred. The flaw results from insufficient input sanitization and lack of output escaping, highlighting that it could compromise the confidentiality and integrity of the site’s content, though these effects are also inferred. This vulnerability corresponds to CWE‑79.

Affected Systems

The flaw exists in the flatboy FlatPM – Ad Manager, AdSense and Custom Code WordPress plugin in all releases with a version number of 3.2.2 or earlier.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, and the EPSS score of under 1 percent suggests a very low probability of exploitation at the time of analysis. The flaw is not listed in the CISA KEV catalog, and exploitation requires authenticated access, though users with contributor authority are common on many sites. The most likely attack path requires the attacker to first gain contributor‑level access, add malicious content to the custom field, and then rely on any site visitor to trigger the script when viewing the affected page.

Generated by OpenCVE AI on April 18, 2026 at 04:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the FlatPM plugin to a version newer than 3.2.2 that includes the fixed input sanitization and output escaping.
  • If an immediate upgrade is not possible, remove the rank_math_description field or clear its content from all entries to eliminate stored scripts.
  • Restrict "Contributor" capability or employ stricter role permissions to limit the number of users who can add or edit custom post meta, thereby reducing the attack surface.

Generated by OpenCVE AI on April 18, 2026 at 04:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description The FlatPM – Ad Manager, AdSense and Custom Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'rank_math_description' custom field in all versions up to, and including, 3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title FlatPM – Ad Manager, AdSense and Custom Code <= 3.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Post Meta
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:51.449Z

Reserved: 2026-01-07T20:19:13.158Z

Link: CVE-2026-0690

cve-icon Vulnrichment

Updated: 2026-01-20T14:52:37.337Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T15:20:07.437

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:00:06Z

Weaknesses