CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
2DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in useStrict bbPress Notify bbpress-notify-nospam allows Reflected XSS.This issue affects bbPress Notify: from n/a through <= 2.19.5.
AnalysisAI
Reflected cross-site scripting in bbPress Notify plugin versions up to 2.19.5 allows unauthenticated remote attackers to execute malicious JavaScript in victim browsers through crafted URLs. The vulnerability stems from improper input sanitization during web page generation (CWE-79). With CVSS 7.1 and changed scope (S:C), successful exploitation enables session hijacking, credential theft, and malicious actions in the victim's context. EPSS score of 0.03% (8th percentile) indicates low observed exploitation probability, and no active exploitation is confirmed (not in CISA KEV), though Patchstack has publicly documented the vulnerability.
Technical ContextAI
The vulnerability exists in the bbPress Notify (bbpress-notify-nospam) WordPress plugin, a notification system for bbPress forum software. The reflected XSS flaw (CWE-79: Improper Neutralization of Input During Web Page Generation) occurs when user-supplied input is incorporated into HTML output without proper encoding or sanitization. In reflected XSS attacks, malicious payloads are embedded in URLs or form inputs and immediately echoed back in the server response. The CVSS vector indicates network-based attack delivery (AV:N), low complexity (AC:L), no privilege requirements (PR:N), but mandatory user interaction (UI:R) - typical of reflected XSS where victims must click a crafted link. The changed scope (S:C) modifier elevates severity as the vulnerability affects resources beyond the vulnerable component's security scope, allowing attackers to interact with the WordPress installation and potentially other plugins or user sessions.
Affected ProductsAI
The vulnerability impacts the bbPress Notify (bbpress-notify-nospam) WordPress plugin maintained by useStrict, affecting all versions from the initial release through version 2.19.5 inclusive. This is a specialized plugin providing notification functionality for bbPress-powered WordPress forums, with a relatively narrow user base compared to mainstream WordPress extensions. Organizations running WordPress sites with bbPress forum integration and the bbPress Notify plugin installed should verify their installed version immediately. The Patchstack vulnerability database provides comprehensive details at https://patchstack.com/database/Wordpress/Plugin/bbpress-notify-nospam/vulnerability/wordpress-bbpress-notify-plugin-2-19-3-cross-site-scripting-xss-vulnerability?_s_id=cve, where the reference specifically mentions version 2.19.3 in the URL path but the CVE data confirms the vulnerability persists through 2.19.5.
RemediationAI
Organizations using bbPress Notify should immediately upgrade to a patched version newer than 2.19.5 if available from the plugin vendor. Consult the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/bbpress-notify-nospam/vulnerability/wordpress-bbpress-notify-plugin-2-19-3-cross-site-scripting-xss-vulnerability?_s_id=cve for specific remediation guidance and patch release information, as the available data does not specify an exact fixed version number. If no patched version is available or immediate patching is not feasible, consider temporary workarounds including disabling the bbPress Notify plugin until a fix is released, implementing Web Application Firewall (WAF) rules to filter XSS attack patterns in requests to bbPress endpoints, deploying Content Security Policy (CSP) headers to restrict inline script execution, and educating users about the risks of clicking untrusted links to the forum platform. For long-term security, evaluate whether the bbPress Notify plugin is actively maintained and consider alternative notification solutions if vendor support appears discontinued.
Share
External POC / Exploit Code
Leaving vuln.today