Impact
The Awa Plugins Wordpress plugin is vulnerable to a Reflected Cross‑Site Scripting flaw caused by inadequate input sanitization during page rendering. A malicious attacker can craft a specially‑crafted URL that, when opened by a victim, causes arbitrary script to execute in the victim’s browser. This may lead to session hijacking, data theft, or page defacement. The weakness is identified as CWE‑79.
Affected Systems
fox‑themes Awa Plugins version 1.4.4 and all earlier releases are affected; versions newer than 1.4.4 are not impacted according to the vendor information.
Risk and Exploitability
The flaw has a CVSS score of 7.1, indicating a medium‑to‑high impact level. Exploit probability according to EPSS is reported as less than 1 %, suggesting a low likelihood of real‑world exploitation at present. This vulnerability is not currently listed in the CISA KEV catalog. Attackers would need to entice a user to visit a crafted URL, meaning the vulnerability is exploitable via social‑engineering or phishing campaigns rather than requiring direct low‑privilege access.
OpenCVE Enrichment