Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OOPSpam Team OOPSpam Anti-Spam oopspam-anti-spam allows Stored XSS.This issue affects OOPSpam Anti-Spam: from n/a through <= 1.2.62.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross-site scripting that allows attacker to run scripts in visitors' browsers
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a stored cross-site scripting flaw in the OOPSpam Anti-Spam WordPress plugin. Improper neutralization of user input allows malicious scripts to be stored in the database and then injected into pages when visitors load them. This flaw gives an attacker the ability to run arbitrary client-side code in the browsers of site visitors, potentially leading to session hijacking, cookie theft, or defacement. The CVE record does not detail the exact input vectors; it is inferred that entries through the plugin’s interfaces could be used to store the payload.

Affected Systems

Any WordPress installation that has the OOPSpam Anti-Spam plugin version that is not newer than 1.2.62 is impacted. The affected range is from the earliest released version (n/a) up to and including 1.2.62. The problem exists in every release of the plugin up to that point, regardless of WordPress core version.

Risk and Exploitability

With a CVSS score of 7.1, this vulnerability is considered high severity. EPSS data is not available, and the flaw is not listed in the CISA KEV catalog, indicating no publicly known exploits at this time. Because the attack does not require elevated privileges on the host and the malicious payload executes in the victim’s browser, an attacker can target any visitor to the site. A stored XSS of this nature could be abused by embedding payloads in the plugin’s input fields, which the records do not explicitly detail but are inferred.

Generated by OpenCVE AI on March 25, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the OOPSpam Anti‑Spam plugin to a version newer than 1.2.62.
  • If an upgrade is not immediately possible, remove or disable the plugin to eliminate the stored XSS surface.
  • After updating or removing, search the site’s database for any remaining malicious scripts that may have been injected.
  • Implement a content security policy to mitigate the impact of any residual XSS payloads.
  • Keep the WordPress core and other plugins updated to limit related attack surfaces.

Generated by OpenCVE AI on March 25, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Oopspam
Oopspam oopspam Anti-spam
Wordpress
Wordpress wordpress
Vendors & Products Oopspam
Oopspam oopspam Anti-spam
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OOPSpam Team OOPSpam Anti-Spam oopspam-anti-spam allows Stored XSS.This issue affects OOPSpam Anti-Spam: from n/a through <= 1.2.62.
Title WordPress OOPSpam Anti-Spam plugin <= 1.2.62 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Oopspam Oopspam Anti-spam
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-25T20:00:53.018Z

Reserved: 2026-03-12T11:12:34.193Z

Link: CVE-2026-32544

cve-icon Vulnrichment

Updated: 2026-03-25T20:00:48.656Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:17:08.253

Modified: 2026-03-30T13:27:12.923

Link: CVE-2026-32544

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:12:11Z

Weaknesses