Impact
The WordPress plugin Integration with Hubspot Forms allows a shortcode that accepts user‑supplied attributes. In all versions up to 1.2.2, the values are not properly sanitized or escaped, so an attacker with Contributor or higher access can inject JavaScript into a page. When a visitor loads that page, the script runs in the context of the site, enabling session hijacking, defacement, or other malicious actions. The vulnerability is a classic stored XSS flaw as categorized by CWE‑79.
Affected Systems
Minnur’s Integration with Hubspot Forms is the affected product. All releases up to and including version 1.2.2 are impacted. A running WordPress site that has the plugin installed and that grants Contributor‑level writers to users is susceptible.
Risk and Exploitability
The CVSS score of 6.4 places the flaw in the medium severity range. No EPSS data is available and the vulnerability has not been listed in the CISA KEV catalog, indicating limited known exploitation at present. The attack vector is an authenticated contributor who can edit posts or pages containing the shortcode; the exploitation requires the attacker to place malicious attribute values within that shortcode. If the admin performs the injection, the script will be stored and executed for all visitors of the affected page.
OpenCVE Enrichment