VYPR
High severity7.1NVD Advisory· Published Jan 27, 2025· Updated Apr 23, 2026

CVE-2025-23792

CVE-2025-23792

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Busters Passwordless WP – Login with your glance or fingerprint passwordless-wp allows Reflected XSS.This issue affects Passwordless WP – Login with your glance or fingerprint: from n/a through <= 1.1.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Passwordless WP plugin for WordPress allows attackers to inject malicious scripts via crafted requests, requiring user interaction.

The Passwordless WP – Login with your glance or fingerprint plugin for WordPress versions up to and including 1.1.6 is vulnerable to reflected cross-site scripting (XSS) due to improper neutralization of user-supplied input during web page generation [1]. This flaw occurs when the plugin reflects unvalidated data back to the user without proper escaping, enabling an attacker to embed arbitrary JavaScript or HTML in a crafted URL.

Exploitation requires a privileged user (e.g., an administrator) to interact with a malicious link, visit a specially crafted page, or submit a form [1]. The attacker does not need authentication beyond luring the target, but the victim must be logged into the WordPress admin interface for the script to execute in that context. The vulnerability is considered moderately dangerous and is expected to be targeted in mass-exploit campaigns, as it can affect thousands of sites regardless of their size or popularity [1].

Successful exploitation allows an attacker to inject malicious scripts that can perform redirections, display advertisements, or deliver other HTML payloads when visitors access the compromised page [1]. This could lead to defacement, credential theft, or further compromise of the site if the injected script issues administrative actions on behalf of the victim.

The vendor has not yet released an official patch, but Patchstack has provided a mitigation rule to block attacks until a proper update is available [1]. As an immediate action, users should update the plugin to the latest version if a patch is released, or contact their hosting provider for assistance in applying temporary mitigations [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.