Impact
The Sphere Manager plugin for WordPress is vulnerable to a stored cross‑site scripting flaw that allows authenticated contributors and higher to inject arbitrary JavaScript into the 'width' attribute of the show_sphere_image shortcode. The injected script runs in the context of a page that a visitor might load. The likely attack vector is a page containing the compromised shortcode. Based on the description, it is inferred that an attacker might attempt to steal session cookies, deface content, or execute additional malicious payloads. The vulnerability stems from insufficient input validation and missing output escaping for the width parameter.
Affected Systems
This issue affects all releases of the Sphere Manager plugin up to and including version 1.0.2. The vendor is devmw and the plugin is deployed within WordPress sites that use Sphere Manager for image handling.
Risk and Exploitability
The flaw has a CVSS v3.1 base score of 6.4 and an EPSS score of less than 1%, indicating a moderate severity but very low predicted exploitation frequency. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated with Contributor role or higher; based on the description, it is inferred that the risk is limited to sites where such users exist. Once the malicious script is injected, any user who accesses the affected page will have the script executed in their browser context, giving the attacker the same privileges as the victim’s browser. No remote code execution or compromise of the server itself is achieved.
OpenCVE Enrichment