Impact
The BetterDocs WordPress plugin contains a stored cross‑site scripting flaw in the 'betterdocs_feedback_form' shortcode. Insufficient sanitization and escaping of user‑supplied shortcode attributes allow attackers to inject arbitrary scripts. Once injected, the malicious code executes whenever an authenticated contributor or higher‐privileged user accesses the page, potentially leading to session hijacking, data theft, or defacement. The weakness is a classic input validation error (CWE‑79).
Affected Systems
BetterDocs plugin for WordPress, versions 4.3.8 and earlier, distributed by wpdevteam. The vulnerability applies to sites that use the feedback form shortcode in any page or post.
Risk and Exploitability
The flaw scores a moderate CVSS 6.4, with no EPSS data and no listing in the CISA KEV catalog, indicating some risk but not a known widespread exploitation. Attack requires authenticated access at the contributor level or higher; the attacker then supplies malicious shortcode attributes. The impact is limited to the contents of the site, but the stored nature means the payload persists until removed or the plugin is upgraded.
OpenCVE Enrichment