The Writeprint Stylometry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'p' GET parameter in all versions up to and including 0.1. This is due to insufficient input sanitization and output escaping in the bjl_wprintstylo_comments_nav() function. The function directly outputs the $_GET['p'] parameter into an HTML href attribute without any escaping. This makes it possible for authenticated attackers with Contributor-level permissions or higher to inject arbitrary web scripts in pages that execute if they can successfully trick another user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alhadeff
Alhadeff writeprint Stylometry Wordpress Wordpress wordpress |
|
| Vendors & Products |
Alhadeff
Alhadeff writeprint Stylometry Wordpress Wordpress wordpress |
Wed, 18 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Writeprint Stylometry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'p' GET parameter in all versions up to and including 0.1. This is due to insufficient input sanitization and output escaping in the bjl_wprintstylo_comments_nav() function. The function directly outputs the $_GET['p'] parameter into an HTML href attribute without any escaping. This makes it possible for authenticated attackers with Contributor-level permissions or higher to inject arbitrary web scripts in pages that execute if they can successfully trick another user into performing an action such as clicking on a link. | |
| Title | Writeprint Stylometry <= 0.1 - Reflected Cross-Site Scripting via 'p' Parameter | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-03-18T15:35:53.589Z
Reserved: 2026-03-04T14:56:33.403Z
Link: CVE-2026-3512
Updated: 2026-03-18T15:34:43.253Z
Status : Awaiting Analysis
Published: 2026-03-18T07:16:21.633
Modified: 2026-03-18T14:52:44.227
Link: CVE-2026-3512
No data.