VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23587

CVE-2025-23587

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashek Al Mahmud all-in-one-box-login all-in-one-login allows Reflected XSS.This issue affects all-in-one-box-login: from n/a through <= 2.0.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WordPress all-in-one-box-login plugin (≤2.0.1) allows attackers to inject malicious scripts via crafted requests, requiring user interaction.

Vulnerability

Overview

The all-in-one-box-login plugin for WordPress (versions up to and including 2.0.1) contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw enables an attacker to inject arbitrary HTML and JavaScript into a page, which is then executed in the context of the victim's browser.

Exploitation

Details

Exploitation requires user interaction: an attacker must trick a privileged user (e.g., an administrator) into clicking a crafted link or visiting a specially prepared page [1]. The vulnerability is classified as reflected XSS, meaning the malicious payload is part of the request and is immediately reflected back in the response. No authentication is needed to deliver the payload, but the target user must be logged into the WordPress site for the attack to succeed.

Impact

Successful exploitation allows the attacker to execute arbitrary scripts in the victim's browser. This can lead to session hijacking, redirection to malicious sites, injection of advertisements, or theft of sensitive information such as cookies or login credentials [1]. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of websites.

Mitigation

The vendor has not yet released an official patch, but users are strongly advised to update the plugin as soon as a fixed version becomes available. In the interim, a mitigation rule from Patchstack can block attacks until a patch can be safely applied [1]. If updating is not possible, consulting a hosting provider or web developer for additional security measures is recommended.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.