WordPress security remains a top priority as websites are frequently targeted by malicious actors exploiting vulnerabilities in plugins. In a recent discovery, a critical Cross-Site Scripting (XSS) vulnerability has been identified in the widely used AGP Font Awesome Collection Plugin, potentially exposing websites to harmful malware attacks. Website owners utilizing this plugin are strongly urged to take immediate action to protect their sites from the potential consequences.

The AGP Font Awesome Collection Plugin, with a CVSS 3.1 score of 7.1, is affected by a high-severity XSS vulnerability. Skalucy reported this security flaw, which allows malicious actors to inject harmful scripts, such as redirects, advertisements, and other HTML payloads, into a website. When visitors access the site, these injected scripts are executed, potentially leading to detrimental outcomes.


With a CVSS 3.1 score of 7.1, the AGP Font Awesome Collection Plugin XSS vulnerability is classified as high severity, indicating its potential for exploitation and its significant impact on affected systems.

Affected Versions:

As of the latest report, no patched version is available to address the vulnerability in the AGP Font Awesome Collection Plugin, leaving websites using this plugin exposed to potential attacks.


Exploiting this XSS vulnerability enables attackers to inject malicious scripts into a website, which are executed when visitors access the site. The consequences of this exploit can be severe and may include data theft, unauthorized access, redirection to harmful websites, or unintended display of advertisements.


To mitigate the risks associated with this vulnerability and enhance WordPress security, website owners are advised to take the following actions:

  1. Discontinue Use: As no patched version is currently available, consider temporarily disabling or removing the AGP Font Awesome Collection Plugin from the affected website until a fix is provided.
  2. Regular Security Audits: Conduct regular security audits of the WordPress website to identify and address potential vulnerabilities proactively.
  3. Stay Informed: Stay vigilant and monitor official updates and announcements regarding the AGP Font Awesome Collection Plugin to be informed about any potential fixes or patches.
  4. Consider Alternatives: In the interim, consider utilizing alternative plugins that provide similar functionality while ensuring they have a strong security track record and regular updates.