VYPR
Medium severity6.4NVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-13656

CVE-2025-13656

Description

The Cute News Ticker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'color' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Cute News Ticker WordPress plugin via the 'color' shortcode attribute allows Contributor+ users to inject arbitrary scripts.

Vulnerability

Overview

The Cute News Ticker plugin for WordPress, versions up to and including 1.0, contains a Stored Cross-Site Scripting (XSS) vulnerability in the 'color' shortcode attribute. The plugin fails to properly sanitize user input and escape output when processing this attribute, allowing malicious script content to be stored and executed in the context of a user's browser [1].

Exploitation

Details

An authenticated attacker with at least Contributor-level access can exploit this flaw by injecting arbitrary web scripts through the 'color' parameter of the plugin's shortcode. When a victim (such as an administrator or site visitor) accesses a page containing the crafted shortcode, the injected script executes. No special network position is required beyond standard WordPress user privileges [1].

Impact

Successful exploitation enables the attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, or defacing pages. Because the script executes in the context of the victim's session, it can potentially lead to privilege escalation if an administrator views the compromised page [1].

Mitigation

Status

The plugin has been closed as of December 4, 2025, and is no longer available for download due to this security issue [1]. Users who have the plugin installed should immediately remove it and replace it with an alternative solution. No patched version exists, and no workaround is provided by the vendor [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.