CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
2DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Designinvento DirectoryPress directorypress allows DOM-Based XSS.This issue affects DirectoryPress: from n/a through <= 3.6.25.
AnalysisAI
DOM-based cross-site scripting (XSS) in Designinvento DirectoryPress WordPress plugin through version 3.6.25 allows authenticated attackers with low privileges to inject malicious scripts that execute in the context of other users' browsers when they view affected pages. The vulnerability requires user interaction (clicking a malicious link) and can affect website visitors across the entire site, potentially leading to session hijacking, credential theft, or malware distribution. EPSS score of 0.02% indicates low exploitation probability despite the publicly available vulnerability details.
Technical ContextAI
DirectoryPress is a WordPress directory listing plugin that processes user-supplied input for dynamic web page generation. The vulnerability stems from improper neutralization of input during DOM (Document Object Model) construction, classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). DOM-based XSS occurs when untrusted data reaches the DOM through methods like innerHTML, eval(), or direct attribute assignment without proper sanitization or encoding. Unlike reflected XSS, DOM-based variants execute entirely in the browser after the page loads, making them harder to detect with traditional network-based security controls. The plugin fails to properly escape or validate user input before it is used to manipulate the DOM, allowing attackers to break out of intended HTML context and inject arbitrary JavaScript.
Affected ProductsAI
Designinvento DirectoryPress WordPress plugin versions from an unspecified starting point through and including version 3.6.25 are affected. The plugin is distributed via WordPress.org plugin repository and identified in Patchstack's vulnerability database. Affected sites running DirectoryPress versions up to and including 3.6.25 require remediation; exact version ranges prior to 3.6.25 are not specified in available data.
RemediationAI
Update DirectoryPress to a patched version newer than 3.6.25 immediately. Check the official WordPress plugin repository or contact Designinvento for the latest available version. Ensure the updated version includes input sanitization and output encoding fixes for DOM-based XSS. As an interim measure, restrict plugin functionality to trusted administrative users only and disable public-facing directory features if the vulnerability is not yet patched. Refer to the Patchstack vulnerability advisory at https://patchstack.com/database/Wordpress/Plugin/directorypress/vulnerability/wordpress-directorypress-plugin-3-6-25-cross-site-scripting-xss-vulnerability for additional remediation guidance and patch availability confirmation.
Share
External POC / Exploit Code
Leaving vuln.today