Impact
In versions up to 0.3.6, the Anomify AI WordPress plugin stores the value of the 'anomify_api_key' field without sufficient sanitation, stripping tags but leaving quotation marks intact. Because the value is later echoed directly into an HTML attribute, an attacker who can authenticate as an administrator can inject arbitrary JavaScript that will execute when any user opens the settings page. The injected script runs in the context of the site and can steal cookies, deface content, or redirect users, compromising confidentiality and integrity of the web application. The weakness is a classic stored cross‑site scripting flaw (CWE‑79).
Affected Systems
The vulnerability affects the Anomify AI – Anomaly Detection and Alerting plugin for WordPress, versions up to and including 0.3.6. Any WordPress installation running an affected version and granting administrative access to a user is susceptible. The plugin is maintained by Simon Holliday. No other product families are impacted.
Risk and Exploitability
The CVSS base score of 4.4 indicates a moderate severity. Because the flaw requires authenticated administrator privileges, the attack surface is limited to sites with such accounts; however, once privileged, the attacker can maliciously alter the stored API key and gain persistence. The EPSS is not available, and the vulnerability is not currently listed in the CISA KEV catalog, suggesting it may not yet be actively exploited. Nevertheless, an exploited stored XSS can compromise user sessions and data integrity on the site. The official references show the lack of proper escaping in the output context and clarify that the input sanitization is insufficient. The potential for widespread damage exists if an attacker targets a high‑traffic WordPress site with this plugin.
OpenCVE Enrichment