VYPR
Medium severity4.4NVD Advisory· Published Dec 13, 2025· Updated Apr 15, 2026

CVE-2025-14378

CVE-2025-14378

Description

The Quick Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Quick Testimonials WordPress plugin up to v2.1 allows admin-level attackers on multisite or unfiltered_html-disabled installs to inject arbitrary web scripts.

The Quick Testimonials plugin for WordPress (versions up to and including 2.1) is vulnerable to Stored Cross-Site Scripting (XSS) via its admin settings. The root cause is insufficient input sanitization and output escaping of user-supplied data within the plugin's administrative interface. This flaw allows authenticated attackers with administrator-level permissions to inject arbitrary web scripts that are stored on the server [1].

The attack surface is limited in scope. The vulnerability is exploitable only on multi-site WordPress installations, or on single-site installations where the unfiltered_html capability has been explicitly disabled for administrators. Because the attack requires administrator-level credentials and the specific insecure configuration, it is not remotely exploitable by unauthenticated users or lower-privileged roles. An attacker with sufficient access can inject malicious scripts via plugin settings, such as in testimonial content or configuration fields [1].

The impact of successful exploitation is that when any other user (including site visitors or other administrators) accesses a page or admin screen that renders the injected payload, the arbitrary script executes in their browser. This can lead to theft of session cookies, defacement of the site, or redirection to malicious domains. Given the administrative context, an attacker could potentially pivot to create new admin accounts or modify site content [1].

The plugin has been closed on the WordPress Plugin Directory as of December 11, 2025, and is no longer available for download due to the unresolved security issue. No patched version exists; site administrators should remove or replace the plugin immediately. Disabling the plugin on affected multisite networks is the recommended workaround until a replacement is found [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.