VYPR
Medium severity6.1NVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-13626

CVE-2025-13626

Description

The myLCO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the $_SERVER['PHP_SELF'] parameter in all versions up to, and including, 0.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The myLCO WordPress plugin up to version 0.8.1 contains a reflected XSS vulnerability via the PHP_SELF parameter, enabling unauthenticated attackers to inject arbitrary web scripts.

Vulnerability

Details

The myLCO plugin for WordPress, in all versions up to and including 0.8.1, suffers from a reflected cross-site scripting (XSS) vulnerability. The issue arises from insufficient input sanitization and output escaping of the $_SERVER['PHP_SELF'] parameter. This server variable, which reflects the current script path, can be manipulated by an attacker to include malicious JavaScript payloads. The plugin fails to properly neutralize the input before rendering it in a response, allowing arbitrary script injection [1].

Exploitation

An unauthenticated attacker can exploit this vulnerability by crafting a malicious URL that includes a JavaScript payload in the path portion of the request. The attacker then tricks a victim into clicking the link, for example via phishing or social engineering. No authentication is required, and the attack does not require any special network position beyond the ability to deliver the link to the user. The injected script executes in the context of the victim's browser session on the WordPress site.

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can lead to session hijacking, defacement of the site, redirection to malicious sites, or theft of sensitive information such as cookies and login credentials. The impact is limited by the reflected nature of the XSS, as the script only executes when the victim clicks the crafted link.

Mitigation

The myLCO plugin has been closed on the WordPress plugin repository as of December 4, 2025, due to this security issue [1]. Users are advised to remove the plugin from their WordPress installations immediately. No patched version is available, and the plugin is no longer supported. As a general best practice, site administrators should ensure all plugins are kept up to date and monitor for similar vulnerabilities.

References
  1. myLCO

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.