Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro FAQ Builder AYS faq-builder-ays allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FAQ Builder AYS: from n/a through <= 1.8.2.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

Improper neutralization of user input when generating web pages in the Ays Pro FAQ Builder AYS plugin allows the injection of arbitrary JavaScript that executes in a visitor’s browser. The weakness stems from a lack of output encoding and is identified as an instance of user‑supplied data not being sanitized before rendering. If successful, injected code can hijack user sessions, deface the site, or exfiltrate sensitive data. The vulnerability matches the well‑known pattern of DOM‑based or page‑generation XSS, creating a clear and direct risk to confidentiality, integrity, and availability of user interactions.

Affected Systems

WordPress sites that have the Ays Pro FAQ Builder AYS plugin installed and are running any version up to and including 1.8.2 are impacted. The flaw exists from the earliest release of the plugin through the mentioned version limit. Sites that have upgraded beyond 1.8.2 are not affected, but any legacy installations remain at risk.

Risk and Exploitability

The CVSS score of 7.1 indicates a moderate‑to‑high severity vulnerability. Based on the description, it is inferred that an attacker can exploit the flaw by submitting malicious content through the plugin’s input fields, a path that does not appear to require authentication due to incorrectly configured access controls. Exploit probability data is not available, and the flaw is not listed as a known exploited vulnerability in CISA’s catalog, suggesting that no large‑scale exploitation has been reported yet. Nonetheless, the lack of authentication barriers makes the threat significant enough to warrant prompt removal or mitigation.

Generated by OpenCVE AI on March 26, 2026 at 00:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the FAQ Builder AYS plugin immediately
  • If an update cannot be applied right away, restrict the plugin’s administration pages to trusted users and, if possible, enforce input sanitization on the affected fields
  • Review and tighten access controls around the plugin to allow only authorized content submissions
  • Monitor the site for signs of malicious JavaScript injection or abnormal HTTP traffic

Generated by OpenCVE AI on March 26, 2026 at 00:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Ays-pro
Ays-pro faq Builder
Wordpress
Wordpress wordpress
Vendors & Products Ays-pro
Ays-pro faq Builder
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro FAQ Builder AYS faq-builder-ays allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FAQ Builder AYS: from n/a through <= 1.8.2.
Title WordPress FAQ Builder AYS plugin <= 1.8.2 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Ays-pro Faq Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:08.855Z

Reserved: 2026-02-02T12:52:42.958Z

Link: CVE-2026-25346

cve-icon Vulnrichment

Updated: 2026-03-25T20:06:48.646Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:16:45.350

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-25346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:12:55Z

Weaknesses