CVE-2025-15363
Description
The Get Use APIs WordPress plugin before 2.0.10 executes imported JSON, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks under certain server configurations.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Get Use APIs WordPress plugin before 2.0.10 executes imported JSON, allowing contributor-level users to perform stored Cross-Site Scripting under specific server configurations.
Vulnerability
Overview The Get Use APIs WordPress plugin (also known as json-content-importer) prior to version 2.0.10 contains a stored Cross-Site Scripting (XSS) vulnerability. The plugin executes imported JSON data without proper sanitization or output escaping, allowing malicious JavaScript to be injected and stored. This issue is classified under CWE-79 and affects the plugin's handling of JSON content [1].
Exploitation
Conditions An attacker must have at least a Contributor role in WordPress to exploit this vulnerability. The attack is possible under certain server configurations, likely related to the availability of the mbstring PHP extension, as referenced in the advisory [1]. The attacker imports a crafted JSON payload that includes JavaScript code, which is then executed when the stored data is rendered on a page.
Impact
Successful exploitation leads to stored XSS, enabling the attacker to execute arbitrary JavaScript in the context of other users, including administrators. This can result in session hijacking, cookie theft, or unauthorized actions performed on behalf of the victim. The CVSS v3 score is 5.9 (Medium) [1].
Mitigation
The vulnerability is fixed in version 2.0.10 of the Get Use APIs plugin. Users are strongly advised to update to the latest version immediately. No workarounds are documented, and the plugin's vendor has released the patch to address the issue [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <2.0.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.