Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup UberSlider Classic uberSlider_classic allows Reflected XSS.This issue affects UberSlider Classic: from n/a through <= 2.5.
Published: 2026-03-05
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross Site Scripting
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a reflected cross‑site scripting flaw that allows an attacker to inject arbitrary script into web pages displayed by WordPress sites using the UberSlider Classic plugin. The flaw resides in improper input neutralization during page generation and is identified as CWE‑79. An attacker who can manipulate inbound parameters can have the browser execute malicious JavaScript, potentially hijacking sessions, defacing content, or distributing further malware. The impact is limited to the victim’s browser but can be amplified if the malicious payload propagates through shared links or social media.

Affected Systems

The affected vendor is LambertGroup, product UberSlider Classic, available as a WordPress plugin. Versions from the earliest releases through 2.5 are vulnerable; no specific patch versions are supplied in the data. Sites running any of these versions are at risk.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity with medium‑to‑high impact potential, while the EPSS score is less than 1% and the vulnerability is not listed in CISA’s KEV catalog, suggesting a low current exploitation probability. The attack vector is web‑based; the flaw can be triggered by a victim visiting a crafted URL or interacting with user input that is echoed back without encoding. No special privileges or authentication are required for exploitation. The risk is therefore moderate, with potential for widespread impact if attackers craft enticing links or social‑engineering campaigns.

Generated by OpenCVE AI on April 15, 2026 at 20:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade UberSlider Classic to a patched version (2.6 or later) when it becomes available.
  • If no update exists, deactivate or uninstall the plugin to eliminate the attack surface.
  • Apply a web application firewall or security plugin that filters reflected XSS payloads.
  • If customizing the plugin, ensure all output is HTML‑encoded to prevent script injection.

Generated by OpenCVE AI on April 15, 2026 at 20:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Lambertgroup
Lambertgroup uberslider Classic
Wordpress
Wordpress wordpress
Vendors & Products Lambertgroup
Lambertgroup uberslider Classic
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup UberSlider Classic uberSlider_classic allows Reflected XSS.This issue affects UberSlider Classic: from n/a through <= 2.5.
Title WordPress UberSlider Classic plugin <= 2.5 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Lambertgroup Uberslider Classic
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:43.068Z

Reserved: 2026-02-25T12:13:56.812Z

Link: CVE-2026-28102

cve-icon Vulnrichment

Updated: 2026-03-05T16:49:45.997Z

cve-icon NVD

Status : Deferred

Published: 2026-03-05T06:16:44.657

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-28102

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:15:13Z

Weaknesses