Impact
The Korea SNS plugin improperly neutralizes user input during web page generation, allowing attackers to inject malicious scripts that execute in the context of a legitimate user’s browser. This DOM‑based cross‑site scripting can enable credential theft, defacement, or the execution of further attacks via the compromised session. Users who visit affected pages may unknowingly expose themselves to these risks.
Affected Systems
The vulnerability affects the WordPress Korea SNS plugin developed by Jongmyoung Kim. All installations running version 1.7.0 or earlier are impacted; newer releases are not listed as affected.
Risk and Exploitability
Because the exploitation path is client‑side and does not require elevated credentials, any visitor can trigger the malicious code by loading a crafted page. While no CVSS or EPSS scores are provided, the nature of XSS grants attackers the ability to subvert user sessions and deface content, representing a moderate to high risk. The vulnerability is not currently listed in the CISA KEV catalog, but the lack of available exploit probability data means the threat cannot be ruled out.
OpenCVE Enrichment