WSMS (formerly WP SMS) – SMS & MMS Notifications with OTP and 2FA for WooCommerce <= 7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting
Description
The WSMS (formerly WP SMS) – SMS & MMS Notifications with OTP and 2FA for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:NTechnical Details
What Changed in the Fix
Changes introduced in v7.1.1
Source Code
WordPress.org SVN# Exploitation Research Plan: CVE-2026-25343 (WSMS - Stored XSS) ## 1. Vulnerability Summary The **WSMS (WP SMS)** plugin for WordPress is vulnerable to **Stored Cross-Site Scripting (XSS)** in versions up to and including **7.1**. The vulnerability exists within the **Outbox** administrative inter…
Show full research plan
Exploitation Research Plan: CVE-2026-25343 (WSMS - Stored XSS)
1. Vulnerability Summary
The WSMS (WP SMS) plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to and including 7.1. The vulnerability exists within the Outbox administrative interface, specifically in the Outbox_List_Table class.
The plugin fails to sanitize or escape the sender and response fields retrieved from the database before displaying them in the WordPress admin dashboard. This allows an authenticated administrator (or anyone with access to plugin settings) to inject malicious JavaScript. In environments where unfiltered_html is disabled (like WordPress Multi-site), this allows an escalation of privilege from a restricted Administrator to a full execution context within the browser of any user (including Super Admins) viewing the SMS Outbox.
2. Attack Vector Analysis
- Vulnerable Page:
wp-admin/admin.php?page=wp-sms-outbox - Injection Point 1 (Sender): The
senderfield in the{prefix}sms_sendtable. This is populated by thesender_numbersetting in the plugin options. - Injection Point 2 (API Response): The
responsefield in the{prefix}sms_sendtable. This is populated by the raw response body received from an SMS gateway. - Authentication: Administrator or higher
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.