CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
2DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bobbingwide oik-privacy-policy oik-privacy-policy allows Reflected XSS.This issue affects oik-privacy-policy: from n/a through <= 1.4.10.
AnalysisAI
Reflected Cross-Site Scripting (XSS) in WordPress plugin oik-privacy-policy versions ≤1.4.10 allows remote attackers to execute arbitrary JavaScript in victims' browsers. Exploitation requires user interaction (victim must click malicious link). EPSS probability is low (0.07%, 22nd percentile), and no active exploitation is confirmed. Reported by Patchstack security audit team, indicating professional vulnerability disclosure.
Technical ContextAI
This vulnerability stems from improper input neutralization during web page generation (CWE-79), a classic reflected XSS flaw. The oik-privacy-policy WordPress plugin fails to properly sanitize user-supplied input before rendering it in HTML responses. In reflected XSS attacks, malicious scripts are embedded in URLs or form parameters, then reflected back to users without adequate encoding or validation. When victims interact with crafted links, the untrusted input executes in their browser context, enabling session hijacking, credential theft, or phishing attacks. The plugin is designed to help WordPress site owners manage GDPR and privacy policy compliance, making it potentially attractive to attackers seeking to compromise sites handling personal data.
Affected ProductsAI
WordPress plugin oik-privacy-policy versions from earliest release through version 1.4.10 inclusive are vulnerable. The vulnerability affects all installations of the plugin within this version range deployed on WordPress sites. Vendor advisory and technical details are available through Patchstack's vulnerability database at https://patchstack.com/database/Wordpress/Plugin/oik-privacy-policy/vulnerability/wordpress-oik-privacy-policy-plugin-1-4-9-cross-site-scripting-xss-vulnerability. The affected version range indicates the flaw existed throughout the plugin's development history until discovery.
RemediationAI
Upgrade oik-privacy-policy to version 1.4.11 or later if available, as the vulnerability affects versions through 1.4.10. Site administrators should verify the installed version through the WordPress plugins dashboard and update immediately. If a patched version has not been released, consider temporarily disabling the plugin until an official fix is available, particularly on production sites handling sensitive user data. Implement Web Application Firewall (WAF) rules to filter malicious input patterns targeting this plugin. Monitor the official WordPress plugin repository and Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/oik-privacy-policy/vulnerability/wordpress-oik-privacy-policy-plugin-1-4-9-cross-site-scripting-xss-vulnerability for patch availability. Review server logs for suspicious requests containing script tags or JavaScript payloads targeting the plugin's endpoints.
Share
External POC / Exploit Code
Leaving vuln.today