CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saleswonder Team Tobias WP2LEADS allows Reflected XSS. This issue affects WP2LEADS: from n/a through 3.5.0.
AnalysisAI
Reflected Cross-Site Scripting (XSS) vulnerability in the Saleswonder Team Tobias WP2LEADS WordPress plugin (versions up to 3.5.0) that allows unauthenticated attackers to inject malicious scripts into web pages viewed by users. An attacker can craft a malicious URL containing JavaScript payload and trick users into clicking it, potentially leading to session hijacking, credential theft, or malware distribution. The vulnerability has a CVSS score of 7.1 (High) with network-based attack vector requiring user interaction, and while KEV/active exploitation status and POC availability are not explicitly confirmed in provided data, the low attack complexity and reflected nature suggest moderate real-world risk.
Technical ContextAI
This vulnerability exploits improper input validation in WP2LEADS, a WordPress plugin developed by Saleswonder Team Tobias, failing to properly neutralize user-supplied input before reflecting it back in HTTP responses (CWE-79: Improper Neutralization of Input During Web Page Generation). The plugin likely accepts user parameters via URL query strings or POST data without sanitization/escaping, allowing attackers to embed arbitrary JavaScript that executes in victims' browsers within the context of the WordPress application. The reflected XSS classification indicates the malicious payload must be delivered via crafted URLs rather than being permanently stored, limiting blast radius but increasing social engineering feasibility. Affected versions span from an unspecified baseline through version 3.5.0, suggesting the vulnerability existed for multiple release cycles.
RemediationAI
Immediate mitigation: upgrade WP2LEADS to the first patched version after 3.5.0 (version number not provided in available data—check Saleswonder/plugin repository for latest release). If upgrade unavailable, temporary workarounds: (1) disable WP2LEADS plugin until patched version released; (2) implement WAF rules blocking common XSS payloads in plugin request parameters; (3) enforce Content-Security-Policy headers restricting script execution; (4) restrict plugin access via IP allowlisting if limited to specific users. Monitor Saleswonder Team Tobias official channels and WordPress plugin security advisories for patch availability. Review WordPress audit logs for evidence of exploitation attempts (suspicious URL parameters with script tags/JavaScript encoding).
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28294