VYPR
Medium severity6.3NVD Advisory· Published Nov 5, 2025· Updated Apr 15, 2026

CVE-2025-10567

CVE-2025-10567

Description

The FunnelKit WordPress plugin before 3.12.0.1 does not sanitize user input before echoing it back in some of its checkout-related AJAX actions, allowing attackers to conduct reflected XSS attacks against logged-in users.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in FunnelKit WordPress plugin before 3.12.0.1 via unsanitized checkout AJAX actions allow attacks against logged-in users.

Vulnerability

Overview The FunnelKit WordPress plugin FunnelKit (versions before 3.12.0.1) fails to sanitize user input before echoing it back in certain checkout-related AJAX actions. This lack of output escaping allows an attacker to inject arbitrary JavaScript into the page, leading to a reflected cross-site scripting (XSS) vulnerability [1].

Exploitation

Details To exploit this flaw, an attacker must trick a logged-in WordPress user into interacting with a crafted link or link that triggers the vulnerable AJAX endpoint. The injected script executes in the context of the victim's session, requiring no additional authentication beyond the user being logged in [1].

Impact

Successful exploitation enables the attacker to execute arbitrary JavaScript in the victim's browser. This can be used to steal session cookies, perform actions on behalf of the user, or deface the page, potentially leading to account takeover or privilege escalation [1].

Mitigation

The vulnerability is fixed in version 3.12.0.1 of the FunnelKit plugin. Users should update immediately. No workaround is provided [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.