CVE-2025-10737
Description
The Open Source Genesis Framework theme for WordPress is vulnerable to Stored Cross-Site Scripting via the theme's shortcodes in all versions up to, and including, 3.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS vulnerability in Genesis Framework up to 3.6.0 allows contributor-level users to inject arbitrary scripts via shortcode attributes.
The Genesis Framework for WordPress versions up to and including 3.6.0 contain a Stored Cross-Site Scripting (XSS) vulnerability in the theme's shortcodes. The root cause is insufficient input sanitization and output escaping on user-supplied attributes, allowing malicious script injection.
Exploitation requires an authenticated attacker with at least contributor-level access. The attacker can inject arbitrary web scripts through shortcode attributes, which are stored and executed whenever a user accesses the affected page.
Successful exploitation enables the attacker to execute arbitrary JavaScript in the context of a victim's browser, potentially leading to session hijacking, defacement, or sensitive data disclosure.
The vulnerability is fixed in version 3.6.1, released on 2025-10-23. The changelog confirms the sanitization of HTML in Genesis shortcode attributes to prevent XSS from contributor-level users [1]. Users are advised to update to version 3.6.1 or later.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=3.6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.