CVE-2025-12034
Description
The Fast Velocity Minify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Fast Velocity Minify plugin for WordPress (≤3.5.1) allows admin-level attackers on multisite or unfiltered_html-disabled installs to inject arbitrary scripts.
Vulnerability
Overview
The Fast Velocity Minify plugin for WordPress, in all versions up to and including 3.5.1, contains a Stored Cross-Site Scripting (XSS) vulnerability in its admin settings. The root cause is insufficient input sanitization and output escaping, which allows authenticated attackers with administrator-level permissions to inject arbitrary web scripts. This vulnerability only affects multi-site installations and installations where the unfiltered_html capability has been disabled [1].
Exploitation
Conditions
An attacker must have administrator-level access to the WordPress admin panel. The attack vector involves injecting malicious script code into plugin settings that are later displayed to other users. The vulnerability is limited to environments where unfiltered_html is disabled (which is the default on multisite networks) or on multisite installations specifically. The attacker does not need any special network position beyond authenticated admin access [1].
Impact
Successful exploitation allows the attacker to inject arbitrary web scripts that execute whenever a user accesses an affected page. This can lead to session hijacking, defacement, or redirection to malicious sites. The stored nature of the XSS means the payload persists and affects all subsequent visitors to the compromised admin page [1].
Mitigation
The vulnerability has been patched in commit 55a8b53a2ec6d358f8d7ad181170b9d8112e78ab, which adds input validation and output escaping improvements. Users should update to version 3.5.2 or later. No workaround is available other than restricting admin access or disabling the plugin until updated [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=3.5.1
Patches
155a8b53a2ec6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.