CVE-2025-13626
Description
The myLCO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the $_SERVER['PHP_SELF'] parameter in all versions up to, and including, 0.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The myLCO WordPress plugin up to version 0.8.1 contains a reflected XSS vulnerability via the PHP_SELF parameter, enabling unauthenticated attackers to inject arbitrary web scripts.
Vulnerability
Details
The myLCO plugin for WordPress, in all versions up to and including 0.8.1, suffers from a reflected cross-site scripting (XSS) vulnerability. The issue arises from insufficient input sanitization and output escaping of the $_SERVER['PHP_SELF'] parameter. This server variable, which reflects the current script path, can be manipulated by an attacker to include malicious JavaScript payloads. The plugin fails to properly neutralize the input before rendering it in a response, allowing arbitrary script injection [1].
Exploitation
An unauthenticated attacker can exploit this vulnerability by crafting a malicious URL that includes a JavaScript payload in the path portion of the request. The attacker then tricks a victim into clicking the link, for example via phishing or social engineering. No authentication is required, and the attack does not require any special network position beyond the ability to deliver the link to the user. The injected script executes in the context of the victim's browser session on the WordPress site.
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can lead to session hijacking, defacement of the site, redirection to malicious sites, or theft of sensitive information such as cookies and login credentials. The impact is limited by the reflected nature of the XSS, as the script only executes when the victim clicks the crafted link.
Mitigation
The myLCO plugin has been closed on the WordPress plugin repository as of December 4, 2025, due to this security issue [1]. Users are advised to remove the plugin from their WordPress installations immediately. No patched version is available, and the plugin is no longer supported. As a general best practice, site administrators should ensure all plugins are kept up to date and monitor for similar vulnerabilities.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Package: https://wordpress.org/plugins/mylco
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.