VYPR
Low severity3.5NVD Advisory· Published Oct 30, 2025· Updated Apr 15, 2026

CVE-2025-10636

CVE-2025-10636

Description

The NS Maintenance Mode for WP WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The NS Maintenance Mode for WP plugin through 1.3.1 has a stored XSS vulnerability where admin users can inject scripts via unsanitized settings.

The NS Maintenance Mode for WP WordPress plugin through version 1.3.1 fails to sanitize and escape some of its settings. This lack of proper input handling allows high-privilege users, such as administrators, to inject arbitrary web scripts into plugin settings pages. Because the vulnerability is stored, the malicious script persists and is executed when other administrators view the affected pages [1].

Exploitation requires administrator-level access to the WordPress dashboard. The vulnerability is especially concerning in multisite installations, where the unfiltered_html capability is typically disallowed for all users, including super admins. This means the plugin's oversight enables a stored cross-site scripting (XSS) attack even when WordPress core would otherwise prevent such injections [1].

An attacker with admin privileges could inject JavaScript that executes in the context of other administrators' sessions. This could lead to session hijacking, unauthorized actions on behalf of other admins, or the injection of malicious content into the site. The impact is limited to users with administrative roles, but in a multisite environment, it could affect site-level administrators [1].

As of the advisory publication, the vulnerability is unpatched and no fix is available. The plugin remains at version 1.3.1, and users are advised to restrict administrative access or consider alternative maintenance mode plugins. The vulnerability has been publicly disclosed and added to WPScan's vulnerability database [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.