VYPR
Medium severity5.9NVD Advisory· Published Mar 18, 2026· Updated Apr 15, 2026

CVE-2025-15363

CVE-2025-15363

Description

The Get Use APIs WordPress plugin before 2.0.10 executes imported JSON, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks under certain server configurations.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Get Use APIs WordPress plugin before 2.0.10 executes imported JSON, allowing contributor-level users to perform stored Cross-Site Scripting under specific server configurations.

Vulnerability

Overview The Get Use APIs WordPress plugin (also known as json-content-importer) prior to version 2.0.10 contains a stored Cross-Site Scripting (XSS) vulnerability. The plugin executes imported JSON data without proper sanitization or output escaping, allowing malicious JavaScript to be injected and stored. This issue is classified under CWE-79 and affects the plugin's handling of JSON content [1].

Exploitation

Conditions An attacker must have at least a Contributor role in WordPress to exploit this vulnerability. The attack is possible under certain server configurations, likely related to the availability of the mbstring PHP extension, as referenced in the advisory [1]. The attacker imports a crafted JSON payload that includes JavaScript code, which is then executed when the stored data is rendered on a page.

Impact

Successful exploitation leads to stored XSS, enabling the attacker to execute arbitrary JavaScript in the context of other users, including administrators. This can result in session hijacking, cookie theft, or unauthorized actions performed on behalf of the victim. The CVSS v3 score is 5.9 (Medium) [1].

Mitigation

The vulnerability is fixed in version 2.0.10 of the Get Use APIs plugin. Users are strongly advised to update to the latest version immediately. No workarounds are documented, and the plugin's vendor has released the patch to address the issue [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.