CVE-2025-23465
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in magent Vampire Character Manager vampire-character allows Reflected XSS.This issue affects Vampire Character Manager: from n/a through <= 2.13.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-Site Scripting (XSS) vulnerability in WordPress Vampire Character Manager plugin up to version 2.13 allows reflected XSS, potentially used in mass exploitation campaigns.
Vulnerability
Overview The Vampire Character Manager plugin for WordPress (version 2.13 and earlier) contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This means the plugin fails to sanitize or escape certain parameters before reflecting them in the HTTP response, enabling an attacker to inject arbitrary HTML or JavaScript code into the page.
Exploitation
Vector The vulnerability is classified as reflected XSS, which means the malicious payload is delivered via a crafted link or form submission and executed immediately in the victim's browser [1]. Exploitation requires user interaction—typically, a privileged user (such as an administrator) must click a specially crafted URL or visit a malicious page while logged into the WordPress admin panel [1]. No direct authentication is needed for the attacker, but the target user must have an active session.
Impact
If successfully exploited, an attacker could inject arbitrary scripts into the affected page, leading to actions such as redirecting visitors to malicious sites, displaying unauthorized advertisements, or executing other HTML payloads [1]. The vulnerability is considered moderately dangerous and is expected to become part of mass-exploit campaigns targeting thousands of WordPress sites regardless of size or popularity [1].
Mitigation
Status The official recommendation is to update the plugin to a patched version as soon as it becomes available [1]. In the meantime, Patchstack has provided a mitigation rule that blocks attempts to exploit this vulnerability [1]. Users unable to update immediately should consult their hosting provider or web developer for assistance. No CVE ID beyond CVE-2025-23465 is mentioned in the reference.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=2.13
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.