VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23519

CVE-2025-23519

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jas Saran G Web Pro Store Locator gwebpro-store-locator allows Reflected XSS.This issue affects G Web Pro Store Locator: from n/a through <= 2.0.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WordPress G Web Pro Store Locator plugin ≤2.0.1 allows attackers to inject malicious scripts via crafted requests.

The G Web Pro Store Locator plugin for WordPress, versions 2.0.1 and below, contains a reflected cross-site scripting (XSS) vulnerability. The plugin fails to properly neutralize input during web page generation, allowing unfiltered user-supplied data to be reflected back in the response [1]. This is a classic instance of improper input sanitization.

Exploitation requires user interaction, such as clicking a crafted link or visiting a maliciously formed page. While an attacker does not need authentication to deliver the link, the targeted user (typically an administrator or editor) must perform an action like clicking the link for the payload to execute [1]. The attack vector is reflected, meaning the malicious script is immediately executed in the victim's browser.

Successful exploitation allows an attacker to inject arbitrary HTML and JavaScript into the victim's browser session. This can be leveraged to perform redirects, display advertisements, steal session tokens, or deface the site [1]. The impact is amplified in mass-exploit campaigns, where attackers target thousands of WordPress sites running the vulnerable plugin.

No official patch has been released as of the publication date. The vendor (Patchstack) offers a mitigation rule to block attacks until an update is available [1]. Users are strongly advised to update the plugin immediately when a patched version is released, or to contact their hosting provider for assistance. The vulnerability has a CVSS v3 score of 7.1 (High) and is listed as expected to be exploited.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.