A researcher at Tenable discovered an unauthenticated reflected cross-site scripting (XSS) vulnerability in the AYS Popup Box WordPress plugin. The XSS vulnerability exists in the 'upgrade_plugin' parameter of the 'deactivate_plugin_option_pb' action, as the parameter is reflected in the response without prior filtering with a Content-Type header of text/html. The vulnerable code was present in the function 'deactivate_plugin_option()' of the file 'admin/class-ays-pb-admin.php'. Proof of Concept: Any user visiting the following link, where wordpress.tld is the instance of wordpress with the plugin installed, will trigger the reflected XSS payload: http://wordpress.tld/wp-admin/admin-ajax.php?action=deactivate_plugin_option_pb&upgrade_plugin=<svg%20onload=alert(document.domain)>