Description
The Simple post listing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class_name' parameter in the postlist shortcode in all versions up to, and including, 0.2. This is due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page via mouse interaction.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
* (semver)
Timeline
| 2025-12-11: | Disclosed |
Credits
Peter Thaleikis
References
www.wordfence.com/...-89f6-49b8-a38f-de2a8df7a7e8?source=cve
plugins.trac.wordpress.org/...gs/0.2/simple-post-listing.php
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.