Impact
The SponsorMe WordPress plugin contains a reflected Cross-Site Scripting vulnerability in which the PHP_SELF variable is reflected into a form action and an anchor href attribute without proper sanitization. An attacker can craft a malicious URL that appends a JavaScript payload to wp-admin/admin.php, causing that script to execute in the victim’s browser when the link is triggered or the form is submitted. The impact is arbitrary client-side script execution, potentially exposing sensitive data or session information to the attacker.
Affected Systems
All installations of the SponsorMe plugin for WordPress with versions up to and including 0.5.2 are affected. The vulnerability resides in the sponsorme.php file of the owencutajar repository.
Risk and Exploitability
With a CVSS score of 6.1 the issue is classified as moderate severity. EPSS is unavailable and the vulnerability is not listed in CISA's KEV catalog. Exploitation does not require authentication; it relies on a crafted URL that the victim must visit or click, making the risk moderate for sites that expose the wp-admin/admin.php path.
OpenCVE Enrichment