CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rustaurius Ultimate Reviews allows Reflected XSS. This issue affects Ultimate Reviews: from n/a through 3.2.14.
AnalysisAI
Reflected Cross-Site Scripting (XSS) vulnerability in Rustaurius Ultimate Reviews WordPress plugin versions up to 3.2.14, allowing unauthenticated attackers to inject malicious scripts that execute in users' browsers. The vulnerability requires user interaction (clicking a malicious link) but can compromise session tokens, steal sensitive data, or perform actions on behalf of affected users. While this is a network-accessible, low-complexity attack with moderate CVSS score (7.1), reflected XSS vulnerabilities are commonly exploited and proof-of-concept code is typically straightforward to develop.
Technical ContextAI
This vulnerability exists in the Rustaurius Ultimate Reviews WordPress plugin (CPE: wp:rustaurius:ultimate_reviews), a widely-used review management system for WordPress. The root cause is CWE-79 (Improper Neutralization of Input During Web Page Generation), meaning user-supplied input is reflected back into the HTML response without proper sanitization or encoding. WordPress plugins typically fail to validate and escape user input in query parameters, POST data, or custom fields before rendering them in page output. The vulnerable code path likely processes user input through functions without calling proper WordPress sanitization functions (wp_kses_post, esc_html, esc_attr, etc.) or relying on outdated sanitization methods. An attacker crafts a URL containing JavaScript payload (e.g., ?param=<script>alert('XSS')</script>) which the plugin echoes back unsanitized, causing the browser to execute the script in the context of the vulnerable site.
RemediationAI
Immediate actions: (1) Update Rustaurius Ultimate Reviews to version 3.2.15 or later (patch version not explicitly stated in CVE; verify via WordPress.org or vendor). (2) If update unavailable, disable the Ultimate Reviews plugin temporarily until patched. (3) If immediate patching is impossible, implement WAF (Web Application Firewall) rules to block requests containing common XSS payloads (script tags, event handlers, javascript: protocol). Short-term: Review server logs for exploit attempts using patterns like '<script', 'onerror=', 'onclick=' in query parameters. Verify no user sessions were compromised and reset admin passwords. Long-term: Implement WordPress security best practices—run regular plugin audits with tools like WPScan, enable automatic plugin updates, use security plugins (Wordfence, Sucuri), restrict admin access via IP allowlisting, and enforce Content Security Policy (CSP) headers to mitigate XSS impact.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28292