VYPR
Medium severity4.4NVD Advisory· Published Oct 18, 2025· Updated Apr 15, 2026

CVE-2025-11926

CVE-2025-11926

Description

The Related Posts Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in Related Posts Lite plugin (≤1.12) allows authenticated administrators to inject malicious scripts via admin settings, affecting multisite or unfiltered_html-disabled installations.

Vulnerability

Description The Related Posts Lite plugin for WordPress (versions up to 1.12) suffers from a Stored Cross-Site Scripting (XSS) vulnerability due to insufficient input sanitization and output escaping in its admin settings page. The plugin uses update_option('rpl_options', $_POST); to save POST data without sanitization, and then renders these values, such as the plugin title, via the [wpdreams_rpl] shortcode without proper escaping (e.g., esc_html()). [1]

Exploitation

An authenticated attacker with administrator-level permissions can inject arbitrary JavaScript into settings fields (e.g., via `). Because the settings form lacks nonce and capability checks, this can also be exploited via Cross-Site Request Forgery (CSRF). The injected script executes when any user accesses a page displaying related posts. [1] The vulnerability is only exploitable on multi-site installations or when administrators have unfiltered_html` disabled, but these conditions are common in multi-site environments. [1]

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session theft, website defacement, or actions performed on behalf of an authenticated user, such as creating new administrator accounts. [1]

Mitigation

As of August 29, 2025, the plugin has been permanently closed and is no longer available for download from the WordPress plugin repository. [2] Users are strongly advised to remove the plugin and replace it with a maintained alternative; no patched version exists.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.