Impact
The Tune Library plugin for WordPress is vulnerable to stored cross‑site scripting via the CSV import feature. The import routine does not perform proper input sanitization or output escaping, and because it lacks authorization checks, a user with Subscriber or higher privileges can inject malicious scripts that are later rendered through the [tune-library] shortcode. This flaw enables an attacker to persistently embed arbitrary JavaScript that will execute when any user visits the injected page, compromising the integrity of the affected site and potentially exposing sensitive data.
Affected Systems
All versions of the Tune Library plugin up to and including 1.6.3 are impacted. The vulnerability affects installations of the WordPress plugin released by jackdewey, and any site that has not been updated beyond version 1.6.3.
Risk and Exploitability
The CVSS v3.1 score of 6.4 indicates moderate severity. The EPSS score is less than 1 %, suggesting a low probability of widespread exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with Subscriber-level access or higher, and the attacker must use the CSV import functionality to inject payloads that are later displayed without escaping. Because the flaw is stored, once injected, the malicious code will affect all users who view the compromised content.
OpenCVE Enrichment