Impact
The Percent to Infograph WordPress plugin allows an attacker to insert arbitrary JavaScript into the percent_to_graph shortcode via insufficient input sanitization and output escaping. The malicious code is stored in the database and executed whenever a user views the affected page, enabling the attacker to run scripts in the victim’s browser. This flaw represents an input‑validation weakness (CWE‑79) that can compromise the integrity and confidentiality of the site’s data.
Affected Systems
All instances of cutesalah’s Percent to Infograph plugin for WordPress that are at or below version 1.0. The plugin is hosted in the WordPress plugin repository and could be present on any WordPress installation that uses it.
Risk and Exploitability
The CVSS score of 6.4 indicates a moderate severity. The EPSS score is reported as less than 1%, suggesting that exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with contributor-level access or higher, who can embed the malicious shortcode during content creation. Once stored, the code executes in the browsers of all users who view the page, creating a risk to institutional confidentiality and integrity.
OpenCVE Enrichment