Impact
Coachific Shortcode for WordPress contains a stored cross‑site scripting flaw that originates from the plugin’s handling of the 'userhash' shortcode attribute. The plugin sanitizes the attribute with sanitize_text_field(), which strips out HTML tags but fails to escape characters that are dangerous in a JavaScript string context. Since the sanitized value is interpolated directly inside a <script> tag, an attacker can inject JavaScript code that will run whenever the page is viewed.
Affected Systems
The vulnerability affects all installations of Coachific Shortcode up to and including version 1.0. Systems running WordPress with the plugin installed are at risk; any deployment that allows Contributors or higher to use shortcodes could be exploited.
Risk and Exploitability
The CVSS score of 6.4 indicates a moderate severity. No EPSS score is available, so the current exploitation probability is unclear. The attack requires authenticated Access control—any user with Contributor or higher privileges can use the shortcode to store malicious payloads. Once injected, the script executes in the browsers of all visitors to the affected post or page.
OpenCVE Enrichment