The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘setstatus’ parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 26 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 26 Mar 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘setstatus’ parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | Smart Maintenance Mode <= 1.5.2 - Reflected Cross-Site Scripting via setstatus Parameter | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-03-26T02:23:49.553Z
Updated: 2025-03-26T18:40:28.240Z
Reserved: 2025-02-19T22:33:34.783Z
Link: CVE-2025-1490

Updated: 2025-03-26T18:40:24.280Z

Status : Received
Published: 2025-03-26T03:15:12.257
Modified: 2025-03-26T03:15:12.257
Link: CVE-2025-1490

No data.