Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kamleshyadav WP Bakery Autoresponder Addon vc-autoresponder-addon allows Stored XSS.This issue affects WP Bakery Autoresponder Addon: from n/a through <= 1.0.6.
Published: 2026-03-05
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply patch
AI Analysis

Impact

An attacker can store malicious script code in a field controlled by the WP Bakery Autoresponder Addon plugin that is then rendered to other site visitors. The stored XSS allows the script to execute in the context of the victim’s browser, enabling cookie theft, session hijacking, defacement, or further exploitation. The weakness is improper neutralization of input during web page generation, a classic input validation flaw identified as CWE‑79.

Affected Systems

WordPress installations that use the WP Bakery Autoresponder Addon plugin version 1.0.6 or earlier are vulnerable. No higher versions are listed as affected, and the plugin is considered impacted from an unknown earliest version through version 1.0.6.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.1, indicating a high impact on confidentiality, integrity, and availability when exploited. The EPSS score of less than 1% suggests that exploitation is unlikely to be widespread at this time. The flaw is not listed in the CISA KeV catalog, so no known active exploit has been reported. The likely attack vector is an attacker with administrator or content‑editing privileges who can inject payloads into plugin‑controlled fields that are later rendered to other users; it could also be exploited via social engineering to trick a user into visiting a malicious link that triggers the stored script. The combination of moderate‑to‑high severity and a low exploitation probability advises timely remediation while monitoring for potential exploitation attempts.

Generated by OpenCVE AI on April 16, 2026 at 05:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Bakery Autoresponder Addon plugin to a version that removes the stored‑XSS flaw (at least 1.0.7 if released).
  • If an upgrade is not immediately available, disable or uninstall the vulnerable plugin to eliminate the attack surface.
  • As a temporary workaround, sanitize or escape all user‑supplied content that the plugin outputs, for example by implementing output encoding filters or by configuring the web server to block script execution in the affected output paths.

Generated by OpenCVE AI on April 16, 2026 at 05:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Kamleshyadav
Kamleshyadav wp Bakery Autoresponder Addon
Wordpress
Wordpress wordpress
Vendors & Products Kamleshyadav
Kamleshyadav wp Bakery Autoresponder Addon
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kamleshyadav WP Bakery Autoresponder Addon vc-autoresponder-addon allows Stored XSS.This issue affects WP Bakery Autoresponder Addon: from n/a through <= 1.0.6.
Title WordPress WP Bakery Autoresponder Addon plugin <= 1.0.6 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Kamleshyadav Wp Bakery Autoresponder Addon
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:11.540Z

Reserved: 2026-02-19T09:51:48.838Z

Link: CVE-2026-27363

cve-icon Vulnrichment

Updated: 2026-03-09T18:10:02.937Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:26.220

Modified: 2026-03-09T19:16:05.303

Link: CVE-2026-27363

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:15:25Z

Weaknesses