CVE-2025-13958
Description
The YaMaps for WordPress Plugin WordPress plugin before 0.6.40 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in YaMaps for WordPress plugin before 0.6.40 via unsanitized shortcode attributes, exploitable by contributor-level users.
The YaMaps for WordPress plugin prior to version 0.6.40 contains a stored cross-site scripting (XSS) vulnerability in its shortcode implementation. The plugin fails to properly validate and escape certain shortcode attributes before outputting them in the page or post where the shortcode is embedded. This lack of sanitization allows an attacker to inject arbitrary JavaScript or HTML into the rendered content [1].
The vulnerability can be exploited by users with at least the Contributor role. The attacker needs to embed the affected shortcode with malicious payloads in the attribute values. When other users (including administrators) view the page or post, the injected script executes in their browser. The attack does not require any elevated privileges beyond the Contributor role and can be performed through the normal post-editing interface [1].
Successful exploitation leads to stored XSS, enabling an attacker can steal session cookies, perform actions on behalf of the victim, or deface the site. The impact is limited by the need for a user with Contributor access to trigger the injection, but the payload then affects all visitors to the compromised page.
The vulnerability is fixed in version 0.6.40 of the YaMaps for WordPress plugin. Users should update to the latest version to the latest version to eliminate the risk [1]. There are no known workarounds other than disabling the plugin or blocking access to shortcodes if updating is not possible.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=0.6.40
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.