Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RSJoomla! RSFirewall! rsfirewall allows Stored XSS.This issue affects RSFirewall!: from n/a through <= 1.1.45.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting leading to client‑side compromise
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw that allows an attacker to inject malicious JavaScript into pages served by WordPress sites using the RSFirewall! plugin. The injected script can execute in the browser context of any visitor, leading to defacement, credential theft, or other client‑side attacks. The weakness is a classic client‑side injection flaw (CWE‑79).

Affected Systems

WordPress sites that have the RSJoomla! RSFirewall! plugin installed, specifically any version up to and including 1.1.45. Users of earlier or later versions are not affected. The plugin itself is provided by RSJoomla! and is distributed as a WordPress plugin.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity. The EPSS score is not available, but exploitation requires the attacker to supply a malicious payload to a site that has the plugin installed, which may be achieved through social engineering or compromised admin accounts. The KEV catalog does not list this vulnerability, so no confirmed exploits are known. However, the stored nature of the payload means that once injected it persists for all site visitors, raising the attack surface. The likely attack vector is a remote web‑based injection delivered by an attacker’s traffic or a compromised administrator.

Generated by OpenCVE AI on March 25, 2026 at 23:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an update to RSFirewall! version 1.1.46 or later
  • If no update is available, uninstall the RSFirewall! plugin
  • As a temporary measure, restrict write permissions on the WordPress wp-content/uploads folder and verify that the plugin does not allow arbitrary input

Generated by OpenCVE AI on March 25, 2026 at 23:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Rsjoomla
Rsjoomla rsfirewall!
Wordpress
Wordpress wordpress
Vendors & Products Rsjoomla
Rsjoomla rsfirewall!
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RSJoomla! RSFirewall! rsfirewall allows Stored XSS.This issue affects RSFirewall!: from n/a through <= 1.1.45.
Title WordPress RSFirewall! plugin <= 1.1.45 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Rsjoomla Rsfirewall!
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-25T20:13:22.145Z

Reserved: 2026-02-02T12:52:37.307Z

Link: CVE-2026-25341

cve-icon Vulnrichment

Updated: 2026-03-25T20:07:05.096Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:16:44.797

Modified: 2026-03-30T13:27:12.923

Link: CVE-2026-25341

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:12:57Z

Weaknesses