Home

Description

The AJS Footnotes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'note_list_class' and 'popup_display_effect_in' parameters in all versions up to, and including, 1.0 due to missing authorization and nonce verification on settings save, as well as insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to update plugin settings and inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PUBLISHED Reserved 2025-12-30 | Published 2026-01-14 | Updated 2026-01-15 | Assigner Wordfence




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-23:Discovered
2026-01-13:Disclosed

Credits

Bhumividh Treloges finder

References

www.wordfence.com/...-c1cf-496f-9b14-35fc70386be1?source=cve

plugins.trac.wordpress.org/...ootnotes.php?marks=138,271,303

cve.org (CVE-2025-15378)

nvd.nist.gov (CVE-2025-15378)

Download JSON