VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23718

CVE-2025-23718

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mancx Mancx AskMe Widget mancx-askme-widget allows Reflected XSS.This issue affects Mancx AskMe Widget: from n/a through <= 0.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in the Mancx AskMe Widget plugin for WordPress allows attackers to inject malicious scripts via unvalidated input.

Vulnerability

Overview

CVE-2025-23718 is a reflected Cross-Site Scripting (XSS) vulnerability found in the Mancx AskMe Widget plugin for WordPress, affecting versions up to and including 0.3. The issue stems from Improper Neutralization of Input During Web Page Generation, allowing unvalidated user input to be reflected in web pages without proper sanitization [1].

Exploitation

Requirements

Exploitation requires user interaction; a privileged user must click a crafted link, visit a specially prepared page, or submit a form that triggers the vulnerable script. This interaction can be achieved through social engineering or by embedding malicious links in comments, emails, or other website communications. The attack vector is network-based, with low attack complexity [1].

Impact

Successful exploitation allows an attacker to inject arbitrary HTML and JavaScript into the target site. This can be used to deliver redirects, advertisements, or other payloads that execute when visitors access the site. The consequences include defacement, phishing, or data theft, depending on the injected payload. The CVSS v3 score of 7.1 (High) reflects the potential for widespread impact [1].

Mitigation

Status

As of the publication date, no official patch has been released for versions 0.3 and below. However, the vendor (Patchstack) has issued a mitigation rule to block attacks until a permanent fix can be applied. Users are strongly advised to update the plugin immediately or contact their hosting provider for assistance if unable to do so. This vulnerability is expected to be used in mass-exploit campaigns, making timely remediation critical [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.