Impact
The vulnerability is a reflected cross‑site scripting flaw caused by improper neutralization of user input during web page generation. An attacker can embed malicious JavaScript into a crafted request, which the G5Theme Darna Framework plugin reflects back into the page. This allows client‑side code execution, enabling actions such as defacement, cookie theft, session hijacking, or phishing. The weakness is identified as CWE‑79 and does not grant server‑side code execution.
Affected Systems
All installations of the G5Theme Darna Framework WordPress plugin version 2.9 or earlier are affected. Site owners running these versions should consider the plugin vulnerable until they upgrade beyond 2.9.
Risk and Exploitability
The CVSS score of 7.1 indicates a medium‑high severity. No EPSS score is available, so the current probability of exploitation cannot be quantified, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is a crafted HTTP request that includes malicious script text – for example, a query string or form input that the plugin renders with insufficient sanitization. An attacker can combine this with social engineering or direct linking to trigger script execution in a victim’s browser.
OpenCVE Enrichment