VYPR
High severity7.1NVD Advisory· Published Dec 30, 2025· Updated Apr 23, 2026

CVE-2025-23550

CVE-2025-23550

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kemal YAZICI Product Puller product-puller allows Reflected XSS.This issue affects Product Puller: from n/a through <= 1.5.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WordPress Product Puller plugin allows attackers to inject malicious scripts via crafted requests, potentially leading to site compromise.

Vulnerability

Overview

The Product Puller plugin for WordPress, versions up to and including 1.5.1, contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw occurs when the plugin fails to sanitize or escape input before including it in output, allowing attackers to inject arbitrary HTML and JavaScript.

Exploitation

Requirements

Exploitation requires user interaction; a privileged user (such as an administrator) must click a malicious link, visit a crafted page, or submit a specially crafted form [1]. The attack can be initiated by an unauthenticated attacker, but successful execution depends on enticing a privileged user to perform the action. This makes the vulnerability moderately dangerous and suitable for mass-exploit campaigns targeting thousands of WordPress sites.

Impact

If exploited, an attacker can inject malicious scripts that execute in the context of the victim's browser. This can lead to redirection to malicious sites, display of advertisements, theft of session cookies, or other actions that compromise the integrity of the website and its visitors [1].

Mitigation

Users are strongly advised to update the Product Puller plugin to a patched version as soon as it becomes available. In the meantime, Patchstack has issued a mitigation rule that blocks attacks until an official patch can be tested and applied [1]. If immediate update is not possible, contacting a hosting provider or web developer for assistance is recommended.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.