Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uixthemes Motta Addons motta-addons allows Reflected XSS.This issue affects Motta Addons: from n/a through < 1.6.1.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

A reflected cross‑site scripting flaw allows attackers to insert malicious JavaScript into page output through URL or form input. The flaw arises because the plugin fails to neutralize user‑supplied data, causing browsers to execute the code in the context of the site or site owner. This can lead to defacement, theft of authentication cookies, or delivery of phishing content. The weakness falls under CWE‑79, which covers insufficient output encoding.

Affected Systems

The vulnerability exists in the Motta Addons plugin for WordPress, produced by uixthemes. All releases prior to version 1.6.1 are affected, meaning any site that has installed the plugin before that update is at risk. The issue is present wherever the plugin renders user‑supplied parameters in web pages or admin screens.

Risk and Exploitability

The flaw carries a CVSS score of 7.1, signifying high severity with medium to high exploitability and significant impact on confidentiality and integrity via client‑side code injection. An attacker can exploit it by crafting a URL or query string with malicious payload that the plugin echoes back, which a visitor's browser will execute without filtering. Although an EPSS score is not available, the lack of an official advisory in the CISA KEV catalog suggests fewer known active exploits. Nevertheless, the high severity rating warrants immediate attention.

Generated by OpenCVE AI on March 25, 2026 at 23:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Motta Addons plugin to version 1.6.1 or later.
  • Verify that the plugin has been updated by checking the WordPress admin plugin list.
  • If a newer version is not yet available, consider disabling the plugin or removing it entirely from the site.
  • As a temporary measure, restrict the input that the plugin processes or employ a web‑application firewall rule to block suspicious query strings.

Generated by OpenCVE AI on March 25, 2026 at 23:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Uixthemes
Uixthemes motta Addons
Wordpress
Wordpress wordpress
Vendors & Products Uixthemes
Uixthemes motta Addons
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uixthemes Motta Addons motta-addons allows Reflected XSS.This issue affects Motta Addons: from n/a through < 1.6.1.
Title WordPress Motta Addons plugin < 1.6.1 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Uixthemes Motta Addons
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:08.405Z

Reserved: 2026-01-28T09:52:08.058Z

Link: CVE-2026-25033

cve-icon Vulnrichment

Updated: 2026-03-25T20:17:31.239Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:16:43.103

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-25033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:13:00Z

Weaknesses