VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23479

CVE-2025-23479

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in melascrivi melascrivi melascrivi allows Reflected XSS.This issue affects melascrivi: from n/a through <= 1.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in the WordPress melascrivi plugin (≤1.4) allows attackers to inject malicious scripts via improper input sanitization.

Vulnerability

Overview

The melascrivi plugin for WordPress (versions up to and including 1.4) suffers from a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during page generation. The plugin does not adequately filter or escape input before including it in web pages, which enables an attacker to inject arbitrary HTML and JavaScript code. [1]

Attack

Vector and Requirements

Exploitation requires user interaction — a victim must click a crafted malicious link, visit a specially prepared page, or submit a form. No elevated privileges are needed to initiate the attack, but the target user must perform the action. This makes the vulnerability well-suited for mass exploitation campaigns against thousands of WordPress sites, regardless of their popularity or traffic size. [1]

Impact

Successful exploitation allows an attacker to execute arbitrary scripts in the victim's browser within the context of the affected WordPress site. This could be used to perform actions like redirecting users to malicious sites, displaying unauthorized advertisements, or stealing session cookies. The CVSS v3 score is 7.1 (High), reflecting the potential for significant impact with moderate risk factors. [1]

Remediation

Status

As an immediate action, users should update the melascrivi plugin to a patched version if available. If an update is not yet released, users are advised to contact their hosting provider or web developer for assistance. Patchstack has also issued a mitigation rule that can block attacks until an official fix is applied and tested. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.