Description
The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[wp_ulike_likers_box]` shortcode `template` attribute in all versions up to, and including, 5.0.1. This is due to the use of `html_entity_decode()` on shortcode attributes without subsequent output sanitization, which effectively bypasses WordPress's `wp_kses_post()` content filtering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The post must have at least one like for the XSS to render.
References (7)
Core 7
Core References
Product
https://plugins.trac.wordpress.org/browser/wp-ulike/trunk/includes/functions/general.php#L375
Product
https://plugins.trac.wordpress.org/browser/wp-ulike/trunk/includes/functions/utilities.php#L226
Product
https://plugins.trac.wordpress.org/browser/wp-ulike/trunk/includes/functions/utilities.php#L251
Scores
CVSS v3
6.4
EPSS
0.0005
EPSS Percentile
14.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
alimir/WP ULike – Like & Dislike Buttons for Engagement and Feedback
< 5.0.1
Published
Mar 11, 2026
Tracked Since
Mar 11, 2026