VYPR
Medium severity6.4NVD Advisory· Published Sep 30, 2025· Updated Apr 15, 2026

CVE-2025-10196

CVE-2025-10196

Description

The Survey Anyplace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'surveyanyplace_embed' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Survey Anyplace plugin for WordPress (≤1.0.0) via insufficient sanitization of shortcode attributes allowing contributor-level+ attackers to inject scripts.

Root

Cause The Survey Anyplace WordPress plugin versions up to and including 1.0.0 contain a stored cross-site scripting (XSS) vulnerability in the surveyanyplace_embed shortcode. The plugin fails to properly sanitize user-supplied attributes (such as style, button_text, or presentation-related fields) before embedding them into output rendered in templates like surveyanyplace.php [1][2]. Insufficient input validation and output escaping allow arbitrary HTML and JavaScript to be injected.

Exploitation

An authenticated attacker with at least Contributor-level access can create or edit a post or page and insert the vulnerable shortcode with malicious payloads in attribute values. The injected code is then stored in the WordPress database and executed in the browser of any visitor who views the affected content. No additional privileges or complex network access are required beyond standard post editing capabilities.

Impact

Successful exploitation results in arbitrary web script execution in the context of the victim's browser session. This can be leveraged to steal session cookies, perform actions on behalf of the victim, deface pages, or redirect users to malicious sites. The XSS is stored, meaning the payload persists and affects multiple users over time.

Mitigation

The vendor has not released a patched version at the time of publication; the vulnerability affects all versions up to 1.0.0. Users should disable the plugin or restrict contributor and author roles until a security update is available. There is no indication this CVE is listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.