CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3Tags
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer allows Reflected XSS.This issue affects tagDiv Composer: from n/a through 5.4.2.
Analysis
tagDiv Composer, a WordPress plugin used by tagDiv themes, contains a reflected cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to inject malicious scripts into web pages. Versions up to and including 5.4.2 are affected. The vulnerability requires user interaction (victim must click a malicious link) but can be exploited remotely without authentication, making it a moderate-severity threat with a CVSS score of 7.1.
Technical Context
This vulnerability stems from improper neutralization of input during web page generation (CWE-79), commonly known as cross-site scripting. The tagDiv Composer plugin fails to properly sanitize user-supplied input before reflecting it back in HTTP responses, allowing attackers to inject arbitrary JavaScript or HTML code. The reflected XSS variant means the malicious payload is not stored on the server but instead transmitted through crafted URLs or form submissions. The affected product is identified as tagDiv Composer for WordPress, a page builder component often bundled with tagDiv themes. The vulnerability was reported by Patchstack's security audit team and assigned ENISA EUVD ID EUVD-2025-208858.
Affected Products
tagDiv Composer plugin for WordPress versions from the initial release through version 5.4.2 are confirmed vulnerable. The vulnerability affects WordPress sites using tagDiv themes that include the tagDiv Composer page builder component. According to the ENISA EUVD record (EUVD-2025-208858), all versions up to and including 5.4.2 should be considered affected. Detailed vulnerability information is available in the Patchstack database at https://patchstack.com/database/wordpress/plugin/td-composer/vulnerability/wordpress-tagdiv-composer-plugin-5-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve.
Remediation
Upgrade tagDiv Composer to a version newer than 5.4.2 as soon as the vendor releases a patched version, monitoring the Patchstack advisory at https://patchstack.com/database/wordpress/plugin/td-composer/vulnerability/wordpress-tagdiv-composer-plugin-5-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve for update notifications. As an interim mitigation, implement web application firewall (WAF) rules to detect and block XSS attack patterns in URL parameters and form submissions, enable Content Security Policy (CSP) headers to restrict script execution to trusted sources, and educate users about the risks of clicking untrusted links. Consider restricting access to WordPress administrative interfaces to trusted IP ranges and implementing additional input validation at the web server or reverse proxy level until the vendor patch is applied.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-208858