Description
The AzonPost plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `editpos_hidden` parameter in all versions up to, and including, 1.3. This is due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.
Published: 2026-05-12
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the AzonPost plugin for WordPress and allows attackers to inject arbitrary JavaScript through the `editpos_hidden` parameter. The lack of proper input sanitisation and output escaping lets a malicious actor embed code that will be reflected back in the page and executed in the browser of any user who views the page, most commonly an administrator. Because the trigger requires the user to click a crafted link or otherwise interact with a page that contains the parameter, the attack is reflected but still leverages social engineering to reach the target. The impact is the compromise of web page integrity and the potential for credential theft, defacement, or further lateral movement within the WordPress installation.

Affected Systems

All versions of the AzonPost plugin by moch-a, up to and including version 1.3, are affected. The plugin is used within WordPress sites that employ the azonpost‑campaign features and expose the `editpos_hidden` parameter in the page interface for administrators.

Risk and Exploitability

The CVSS score of 6.1 marks this issue as a moderate‑severity vulnerability. EPSS data is not available, so the exact probability of exploitation can’t be quantified from the data, but the vulnerability is not listed in CISA’s KEV catalog. Attackers would need to lure an administrator to click a crafted link that includes malicious payloads; once the link is activated, the injected script runs in the administrator’s browser context, potentially giving the attacker remote code execution capabilities within the WordPress site. The vulnerability is exploitable without prior exploitation of other components, though the social‑engineering component limits its indiscriminate use.

Generated by OpenCVE AI on May 12, 2026 at 10:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AzonPost plugin to the latest available version (or remove it entirely if the feature is no longer required).
  • If an upgrade is not immediately possible, restrict the editpos_hidden endpoint to trusted users only and screen the input with WordPress’s sanitize_text_field() before any processing.
  • Audit the WordPress installation to identify any other exposed parameters that might allow reflected XSS and apply the same sanitization and escaping recommendations.

Generated by OpenCVE AI on May 12, 2026 at 10:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The AzonPost plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `editpos_hidden` parameter in all versions up to, and including, 1.3. This is due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.
Title AzonPost <= 1.3 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-12T21:14:18.381Z

Reserved: 2026-04-29T15:35:53.194Z

Link: CVE-2026-7437

cve-icon Vulnrichment

Updated: 2026-05-12T21:14:13.882Z

cve-icon NVD

Status : Deferred

Published: 2026-05-12T09:16:57.047

Modified: 2026-05-12T14:03:52.757

Link: CVE-2026-7437

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:45:14Z

Weaknesses