Impact
The Text Toggle plugin for WordPress is susceptible to stored cross‑site scripting when the 'title' attribute of the [tt_part] or [tt] shortcodes is used. Because the plugin concatenates the raw attribute value directly into both an HTML attribute and regular content without escaping, an attacker can inject quote characters and arbitrary event‑handler attributes, allowing execution of malicious scripts in the browser of any visitor to the affected page. This vulnerability is classified as CWE‑79, meaning it can compromise confidentiality, integrity, and availability through script injection.
Affected Systems
Any WordPress installation running the hoosierdragon Text Toggle plugin version 1.1 or earlier is impacted. Sites using these versions must have the plugin enabled; the flaw is triggered only when a user with Contributor‑level or higher privileges creates or edits a post containing a vulnerable shortcode.
Risk and Exploitability
The CVSS score of 6.4 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Attackers need authenticated Contributor (+) access to insert the malicious shortcode; once the payload is stored, it will be rendered and executed for all users who view the page, making the exploit highly effective but limited to sites that allow such content editing by that role.
OpenCVE Enrichment