VYPR
Medium severity6.4OSV Advisory· Published Sep 26, 2025· Updated Apr 15, 2026

CVE-2025-10180

CVE-2025-10180

Description

The Markdown Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'markdown' shortcode in all versions up to, and including, 0.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Markdown Shortcode plugin for WordPress ≤0.2.1 has a stored XSS vulnerability via the 'markdown' shortcode, allowing contributors to inject arbitrary scripts.

The Markdown Shortcode plugin for WordPress, in all versions up to and including 0.2.1, contains a stored cross-site scripting (XSS) vulnerability in its [markdown] shortcode. The root cause is insufficient input sanitization and output escaping on user-supplied attributes, allowing malicious HTML or JavaScript to be processed and stored [1][2].

Exploitation

An authenticated attacker with contributor-level access or higher can inject arbitrary web scripts through the shortcode. When a user visits a page containing the crafted shortcode, the injected script executes in the context of the victim's browser. No additional privileges or user interaction beyond viewing the page is required [1][2].

Impact

Successful exploitation enables an attacker to perform actions such as stealing session cookies, defacing the site, or redirecting users to malicious sites. The CVSS v3.1 score is 6.4 (Medium) with the vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, indicating low confidentiality and integrity impact but a scope change [2].

Mitigation

The vulnerability is fixed in version 0.2.3, which adds wp_kses_post() sanitization to the markdown output, removing dangerous HTML tags like `` while preserving safe HTML [1][2]. All users are strongly advised to update immediately.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.