Impact
The Anomify AI plugin for WordPress fails to verify a nonce on its settings page handler and does not escape output when rendering the stored API key. This allows an attacker to create a form that submits a crafted value to the plugin. A double‑quote payload can survive sanitization, be stored in the database, and later executed as JavaScript when an administrator loads the settings page, leading to stored cross‑site scripting. The attack does not provide direct remote code execution, but it can be used to steal admin credentials, hijack sessions, or deface the site inside the administrator’s browser.
Affected Systems
All WordPress sites using Anomify AI versions up to and including 0.3.6 are affected. The vulnerability applies to the plugin’s settings page and API key field handling.
Risk and Exploitability
With a CVSS score of 4.3 the vulnerability is considered moderate. The EPSS score is unavailable, and the issue is not listed in the CISA KEV catalog, indicating that there are no known active exploits. The likely attack vector is CSRF: an attacker must trick a logged‑in administrator into visiting a malicious page that submits a forged request. Once the payload is stored, every subsequent visit to the settings page by that administrator will trigger script execution. Mitigation is expected to involve removal of the CSRF flaw and proper output escaping.
OpenCVE Enrichment