CVE-2025-23553
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Cramer Userbase Access Control userbase-access-control allows Reflected XSS.This issue affects Userbase Access Control: from n/a through <= 1.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in WordPress Userbase Access Control plugin ≤1.0 lets attackers inject scripts via crafted requests.
Vulnerability
Overview
The Userbase Access Control plugin for WordPress (versions up to and including 1.0) contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This allows an attacker to inject arbitrary HTML and JavaScript into a response that is immediately reflected back to the user's browser.
Exploitation
Details
Exploitation requires user interaction: a victim (typically a site administrator or privileged user) must click a malicious link, visit a specially crafted page, or submit a form designed by the attacker [1]. No authentication is needed for the attacker to craft the payload, but the victim must be logged into the WordPress site for the injected script to execute in the context of the admin session.
Impact
Successful exploitation enables the attacker to execute malicious scripts in the victim's browser. This can lead to actions such as redirecting visitors to malicious sites, injecting advertisements, stealing session cookies, or performing other actions on behalf of the victim within the WordPress admin dashboard [1]. Given the plugin's limited user base, the vulnerability is expected to be used in automated mass-exploit campaigns targeting numerous WordPress sites.
Mitigation
Users should immediately update the plugin to a patched version if available. As of the publication date, no official patch has been released, but Patchstack has issued a mitigation rule to block attacks until an update can be safely applied [1]. Site administrators unable to update should consult their hosting provider or a web developer for assistance.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.