Impact
The Alfie – Feed Plugin for WordPress embeds user‑supplied data from the 'naam' parameter directly into the database without validating a nonce or escaping the input. This flaw enables an unauthenticated attacker to inject JavaScript that is permanently stored and executed whenever the affected page is loaded. As a result, visitors or administrators who load the page can have their session data stolen, be redirected to malicious sites, or have the site defaced.
Affected Systems
WordPress sites that have the Alfie – Feed Plugin (developer: pftool) installed with version 1.2.1 or any earlier release are vulnerable. The issue exists in all releases up to and including 1.2.1; newer releases or the trunk code base do not contain the flaw.
Risk and Exploitability
The CVSS score of 6.1 indicates a moderate severity. The attack requires no authentication but relies on convincing an administrator to trigger the payload, typically by clicking on a crafted link or form. Because the malicious code is stored in the database, it persists across users and sessions, amplifying the impact. No EPSS score is currently available, and the vulnerability is not listed in CISA’s KEV catalog.
OpenCVE Enrichment