Description
The Comment Genius plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-03-21
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting via unsanitized PHP_SELF parameter
Action: Patch Immediately
AI Analysis

Impact

The Comment Genius plugin for WordPress, versions up to and including 1.2.5, fails to sanitize or escape the $_SERVER['PHP_SELF'] variable when rendering content. This deficiency lets attackers inject arbitrary JavaScript that is executed in the browsers of visitors who click a specially crafted link. The impact is the potential execution of malicious scripts on the victim’s browser, which can lead to data theft, session hijacking, or defacement of the site. The weakness aligns with CWE-79 (Improper Neutralization of Input During Web Page Generation).

Affected Systems

Any WordPress installation running the Comment Genius plugin version 1.2.5 or older is vulnerable. This includes all sites that have not upgraded beyond the 1.2.5 release during the first year of 2026.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, reflecting the requirement of a crafted user interaction to exploit the flaw. No EPSS score is available, and the issue is not listed in the CISA KEV catalog. The likely attack vector involves an unauthenticated adversary persuading a legitimate user to click a malicious link that contains the injected payload, resulting in reflected client‑side script execution.

Generated by OpenCVE AI on March 21, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Comment Genius plugin to the latest available version (≥1.2.6).
  • If an update cannot be performed immediately, uninstall or disable the vulnerable plugin to eliminate the XSS vector.

Generated by OpenCVE AI on March 21, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Basiliskan
Basiliskan comment Genius
Wordpress
Wordpress wordpress
Vendors & Products Basiliskan
Basiliskan comment Genius
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Comment Genius plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Comment Genius <= 1.2.5 - Reflected Cross-Site Scripting via $_SERVER['PHP_SELF']
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Basiliskan Comment Genius
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:14:04.770Z

Reserved: 2026-01-29T18:45:17.323Z

Link: CVE-2026-1647

cve-icon Vulnrichment

Updated: 2026-03-23T16:36:20.279Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:16:54.113

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-1647

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:41:49Z

Weaknesses