CVE-2025-23550
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kemal YAZICI Product Puller product-puller allows Reflected XSS.This issue affects Product Puller: from n/a through <= 1.5.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in WordPress Product Puller plugin allows attackers to inject malicious scripts via crafted requests, potentially leading to site compromise.
Vulnerability
Overview
The Product Puller plugin for WordPress, versions up to and including 1.5.1, contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw occurs when the plugin fails to sanitize or escape input before including it in output, allowing attackers to inject arbitrary HTML and JavaScript.
Exploitation
Requirements
Exploitation requires user interaction; a privileged user (such as an administrator) must click a malicious link, visit a crafted page, or submit a specially crafted form [1]. The attack can be initiated by an unauthenticated attacker, but successful execution depends on enticing a privileged user to perform the action. This makes the vulnerability moderately dangerous and suitable for mass-exploit campaigns targeting thousands of WordPress sites.
Impact
If exploited, an attacker can inject malicious scripts that execute in the context of the victim's browser. This can lead to redirection to malicious sites, display of advertisements, theft of session cookies, or other actions that compromise the integrity of the website and its visitors [1].
Mitigation
Users are strongly advised to update the Product Puller plugin to a patched version as soon as it becomes available. In the meantime, Patchstack has issued a mitigation rule that blocks attacks until an official patch can be tested and applied [1]. If immediate update is not possible, contacting a hosting provider or web developer for assistance is recommended.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=1.5.1+ 1 more
- (no CPE)range: <=1.5.1
- (no CPE)range: <=1.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.