The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'data-uuid' attribute in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 29 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Streamweasels
Streamweasels kick Integration Wordpress Wordpress wordpress |
|
| Vendors & Products |
Streamweasels
Streamweasels kick Integration Wordpress Wordpress wordpress |
Tue, 29 Jul 2025 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'data-uuid' attribute in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
| Title | StreamWeasels Kick Integration <= 1.1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-29T03:41:21.378Z
Updated: 2025-07-29T13:47:50.448Z
Reserved: 2025-07-18T15:18:46.189Z
Link: CVE-2025-7810
Updated: 2025-07-29T13:47:48.270Z
Status : Awaiting Analysis
Published: 2025-07-29T04:15:57.350
Modified: 2025-07-29T14:14:29.590
Link: CVE-2025-7810
No data.