CVE-2025-7431: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ajay Knowledge Base
The Knowledge Base plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin slug setting in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
CVE-2025-7431: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ajay Knowledge Base
Description
The Knowledge Base plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin slug setting in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-10T13:28:24.596Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6879aae8a83201eaacec206e
Added to database: 7/18/2025, 2:01:12 AM
Last updated: 7/18/2025, 2:01:12 AM
Views: 1
Related Threats
CVE-2025-7767: Cross Site Scripting in PHPGurukul Art Gallery Management System
MediumCVE-2025-7765: SQL Injection in code-projects Online Appointment Booking System
MediumCVE-2025-7764: SQL Injection in code-projects Online Appointment Booking System
MediumCVE-2025-7763: Open Redirect in thinkgem JeeSite
MediumNew TeleMessage SGNL Vulnerability Is Actively Being Exploited by Attackers
MediumActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.