Description
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
Published: 2026-01-24
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply patch
AI Analysis

Impact

The Save as PDF Plugin by PDFCrowd is vulnerable to reflected cross‑site scripting through the unsanitized options parameter. An attacker can embed malicious JavaScript in a crafted URL; if a user follows that link while the plugin is in demo mode (or the attacker knows the API key), the script executes in the victim’s browser. This allows an unauthenticated attacker to run arbitrary code within the context of the site’s web page.

Affected Systems

All WordPress installations that use the Save as PDF Plugin by PDFCrowd and have a version of 4.5.5 or earlier are affected. The vulnerability exists in every release up to and including version 4.5.5, regardless of the WordPress core version.

Risk and Exploitability

The CVSS score of 6.1 reflects moderate severity, while the EPSS score of less than 1 % indicates a low likelihood of exploitation at this time. The vulnerability is not included in CISA’s KEV catalog. Successful exploitation requires that the plugin be operating in demo mode (blank API key) or that the attacker already knows the API key, and it requires user interaction to trigger the malicious script.

Generated by OpenCVE AI on April 15, 2026 at 21:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Save as PDF Plugin by PDFCrowd to a version newer than 4.5.5 where the issue is fixed.
  • Configure the plugin with a valid API key to disable demo mode, which eliminates the vulnerability’s prerequisite.
  • Restrict the plugin’s usage to authenticated administrators or apply server‑side validation to sanitize the options parameter, reducing any remaining risk.

Generated by OpenCVE AI on April 15, 2026 at 21:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Pdfcrowd
Pdfcrowd save As Pdf
Pdfcrowd save As Pdf Plugin
Wordpress
Wordpress wordpress
Vendors & Products Pdfcrowd
Pdfcrowd save As Pdf
Pdfcrowd save As Pdf Plugin
Wordpress
Wordpress wordpress

Sat, 24 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
Description The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
Title Save as PDF Plugin by PDFCrowd <= 4.5.5 - Reflected Cross-Site Scripting via options
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Pdfcrowd Save As Pdf Save As Pdf Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:01:05.994Z

Reserved: 2026-01-12T14:46:34.760Z

Link: CVE-2026-0862

cve-icon Vulnrichment

Updated: 2026-01-26T15:29:23.881Z

cve-icon NVD

Status : Deferred

Published: 2026-01-24T16:15:52.697

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:45:14Z

Weaknesses