VYPR
High severity7.1NVD Advisory· Published Jan 27, 2025· Updated Apr 23, 2026

CVE-2025-23752

CVE-2025-23752

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Clifton Griffin CGD Arrange Terms shopp-arrange allows Reflected XSS.This issue affects CGD Arrange Terms: from n/a through <= 1.1.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in WordPress CGD Arrange Terms plugin (≤1.1.3) allows attackers to inject malicious scripts via crafted requests, requiring user interaction.

Vulnerability

Overview The CGD Arrange Terms plugin for WordPress (shopp-arrange) versions up to and including 1.1.3 suffer from a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation. This means the plugin fails to sanitize or escape user-supplied data before outputting it, allowing an attacker to inject arbitrary HTML and JavaScript. [1]

Exploitation

Details Exploitation requires user interaction: a privileged user (such as an administrator) must click a crafted link, visit a specially prepared page, or submit a malicious form. The attacker does not need authentication but relies on tricking an authenticated user into performing an action. This makes the vulnerability suitable for mass exploitation campaigns targeting WordPress sites. [1]

Impact

Successful exploitation enables an attacker to inject malicious scripts that can execute in the context of the victim's browser. This can lead to redirects to malicious sites, display of unwanted advertisements, theft of session cookies, or other actions that compromise the site's integrity and user trust. [1]

Mitigation

The vendor has not released an official patch as of the publication date, but Patchstack has provided a mitigation rule to block attacks. Users are strongly advised to update the plugin to a patched version once available, or apply the mitigation rule. Immediate action is recommended due to the potential for mass exploitation. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.