Description
The Inactive Logout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ina_redirect_page_individual_user' parameter in all versions up to, and including, 3.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
* (semver)
Timeline
| 2025-10-27: | Vendor Notified |
| 2025-10-31: | Disclosed |
Credits
Angus Girvan
References
www.wordfence.com/...-c559-4d45-91c0-a3dd5ff05c4d?source=cve
plugins.trac.wordpress.org/...ontrollers/AdminController.php
plugins.trac.wordpress.org/...lers/Admin/StoreController.php
plugins.trac.wordpress.org/...l-inactive-logout-advanced.php
plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=