Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Socio WP Telegram Widget and Join Link wptelegram-widget allows Reflected XSS.This issue affects WP Telegram Widget and Join Link: from n/a through <= 2.2.13.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Reflected)
Action: Apply Patch
AI Analysis

Impact

WP Socio WP Telegram Widget and Join Link plugin allows an attacker to inject malicious JavaScript via unsanitized user input, enabling reflected XSS. The flaw lets the attacker embed arbitrary scripts that execute in the browser of any user who visits a crafted page. This can lead to defacement of the site, theft of session cookies, or other client‑side compromise.

Affected Systems

WP Socio WP Telegram Widget and Join Link plugin is impacted on all installations running version 2.2.13 or earlier. No other versions are affected.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.1. The attack requires a malicious URL or form submission that an unsuspecting user clicks or submits. Because the input is reflected in the response without escaping, a successful exploit is straightforward for an attacker with minimal skill. The CVSS score reflects that an attacker can gain both confidentiality and integrity through persistent client‑side code execution. The EPSS score is not available, and the issue is not listed in the KEV catalog.

Generated by OpenCVE AI on March 25, 2026 at 22:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Socio WP Telegram Widget and Join Link to version 2.2.14 or later, if available.
  • If the update cannot be applied immediately, remove or disable the widget from publicly accessible pages until a patch is available.
  • Implement stricter input validation and output escaping on user‑controlled parameters to mitigate XSS until the official fix is installed.

Generated by OpenCVE AI on March 25, 2026 at 22:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpsocio
Wpsocio wp Telegram Widget And Join Link
Vendors & Products Wordpress
Wordpress wordpress
Wpsocio
Wpsocio wp Telegram Widget And Join Link

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Socio WP Telegram Widget and Join Link wptelegram-widget allows Reflected XSS.This issue affects WP Telegram Widget and Join Link: from n/a through <= 2.2.13.
Title WordPress WP Telegram Widget and Join Link plugin <= 2.2.13 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Wordpress Wordpress
Wpsocio Wp Telegram Widget And Join Link
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-25T20:23:33.934Z

Reserved: 2026-01-16T14:15:17.505Z

Link: CVE-2026-23807

cve-icon Vulnrichment

Updated: 2026-03-25T20:18:06.397Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:16:36.000

Modified: 2026-03-30T13:27:35.820

Link: CVE-2026-23807

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:13:13Z

Weaknesses