Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PublishPress Post Expirator post-expirator allows DOM-Based XSS.This issue affects Post Expirator: from n/a through <= 4.9.4.
Published: 2026-04-08
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The affected component is a WordPress plugin that fails to neutralize user input before rendering it in the browser, resulting in a DOM‑based Cross‑Site Scripting flaw. When exploited, an attacker can inject and execute arbitrary JavaScript within the context of the site as seen by visitors, potentially stealing session data, hijacking accounts, defacing content, or redirecting users to malicious locations. The weakness stems from improper input sanitization in the page generation logic.

Affected Systems

The vulnerability exists in the PublishPress Post Expirator WordPress plugin for all versions up to and including 4.9.4. Any WordPress installation that has this plugin installed and whose version has not been upgraded beyond 4.9.4 is susceptible. No other vendors or product lines are identified in the available data.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, while the EPSS score of less than 1% suggests that the vulnerability is unlikely to be actively exploited in the wild. The CVE is not listed in the CISA KEV catalog. The attack path is inferred: a malicious actor may craft a URL or embed malicious input that is reflected by the plugin in the browser, whereby an unsuspecting site visitor’s browser executes the injected script. This exploitation requires no privileged access or authentication, but does require a visitor to process a page that includes the vulnerable content. The overall risk is heightened for sites with broad public traffic or those handling sensitive user interactions.

Generated by OpenCVE AI on April 13, 2026 at 21:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PublishPress Post Expirator to version 4.9.5 or later as soon as it becomes available.
  • If upgrading is not immediately possible, disable the plugin to remove the attack surface.
  • Implement a strong Content‑Security‑Policy that blocks execution of inline scripts and disallows unknown origins.
  • Ensure that the WordPress core and all other plugins are kept up to date to reduce overall security exposure.
  • Monitor vendor advisories and security bulletins for any future updates or additional mitigations.

Generated by OpenCVE AI on April 13, 2026 at 21:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Publishpress
Publishpress post Expirator
Wordpress
Wordpress wordpress
Vendors & Products Publishpress
Publishpress post Expirator
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PublishPress Post Expirator post-expirator allows DOM-Based XSS.This issue affects Post Expirator: from n/a through <= 4.9.4.
Title WordPress Post Expirator plugin <= 4.9.4 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Publishpress Post Expirator
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:01.909Z

Reserved: 2026-04-07T10:42:07.236Z

Link: CVE-2026-39482

cve-icon Vulnrichment

Updated: 2026-04-13T18:51:12.098Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:22.830

Modified: 2026-04-24T18:08:35.440

Link: CVE-2026-39482

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:04Z

Weaknesses