CVE-2025-11876
Description
The Mailgun Subscriptions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mailgun_subscription_form' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Mailgun Subscriptions WordPress plugin's shortcode allows contributor+ users to inject scripts via unsanitized description attribute.
Vulnerability
Overview The Mailgun Subscriptions plugin for WordPress up to version 1.3.1 contains a Stored Cross-Site Scripting (XSS) vulnerability in its mailgun_subscription_form shortcode. The root cause is insufficient input sanitization and output escaping on user-supplied attributes, specifically the description parameter. The official patch [1] shows that the fix applies wp_kses_post() to the description value before passing it to the form display function, confirming the lack of filtering in vulnerable versions.
Attack
Vector An authenticated attacker with at minimum contributor-level access to WordPress can exploit this vulnerability by crafting a shortcode block with a malicious description attribute. The unsanitized input is then stored and rendered on pages where the shortcode is used. When any user (including administrators or visitors) accesses the affected page, the injected script executes within the context of the victim's browser session.
Impact
Successful exploitation allows the attacker to execute arbitrary web scripts in the browser of anyone visiting the compromised page. This can lead to session hijacking, defacement, redirection to malicious websites, or theft of sensitive information such as cookies or authentication tokens. The scope of impact is amplified because the injected content persists until removed, affecting all subsequent viewers.
Remediation
The vulnerability has been patched in a commit to the plugin's GitHub repository [1]. Users are strongly advised to update the Mailgun Subscriptions plugin to the latest version that includes the sanitization fix. No workaround is available other than removing or restricting contributor access until the plugin can be updated.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=1.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/flightless/mailgun-subscriptions/pull/8/commits/a8b597e3a09f3a1b76436d09de434fd9bfe29f64nvd
- plugins.trac.wordpress.org/browser/mailgun-subscriptions/tags/1.2.0/Mailgun_Subscriptions/Subscription_Form.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/149e60cc-9612-4651-b02d-4b68a3533d36nvd
News mentions
0No linked articles in our index yet.