VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23564

CVE-2025-23564

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mohsenshahbazi WP FixTag wp-fixtag allows Reflected XSS.This issue affects WP FixTag: from n/a through <= v2.0.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in WP FixTag WordPress plugin ≤2.0.2 allows attackers to inject malicious scripts via improper input neutralization.

Vulnerability

Overview The WP FixTag plugin for WordPress versions up to and including 2.0.2 contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This allows an attacker to inject arbitrary HTML and JavaScript code into the application's response.

Exploitation

Conditions The vulnerability is classified as reflected XSS, meaning the malicious payload is provided via a crafted request (e.g., a URL parameter) and is immediately reflected back in the server's response [1]. Exploitation requires user interaction, such as a victim clicking a specially crafted link or visiting a malicious page. The attacker does not need prior authentication, but the victim must be logged into the WordPress site for the injected script to execute in a privileged context.

Impact

Successful exploitation enables the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can be used to redirect users to malicious sites, display unwanted advertisements, steal session cookies, or perform actions on behalf of the victim [1]. The vulnerability has a CVSS score of 7.1 (High) and is expected to be used in mass exploitation campaigns.

Mitigation

Users are advised to update the WP FixTag plugin to a patched version as soon as available. As an immediate workaround, the Patchstack platform provides a virtual mitigation rule that blocks attacks until an official patch is released [1]. Administrators who cannot update immediately should consult their hosting provider for assistance.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.