VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23814

CVE-2025-23814

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRUDLab CRUDLab Like Box crudlab-facebook-like-box allows Reflected XSS.This issue affects CRUDLab Like Box: from n/a through <= 2.0.9.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in CRUDLab Like Box WordPress plugin up to version 2.0.9 allows script injection via unneutralized input.

The CRUDLab Like Box WordPress plugin (crudlab-facebook-like-box) suffers from a Reflected Cross-Site Scripting (XSS) vulnerability in all versions up to and including 2.0.9. The root cause is improper neutralization of user-supplied input during web page generation, which allows an attacker to inject arbitrary JavaScript into dynamically generated responses.

Exploitation requires user interaction: a privileged user must click a crafted link or visit a specially prepared page. The attacker does not need authentication but relies on social engineering to trick the target into performing the action. This is a typical reflected XSS pattern where the malicious payload is part of the request and reflected back in the response without proper sanitization.

Successful exploitation allows an attacker to execute arbitrary HTML and JavaScript in the browser of the victim, leading to actions such as redirecting visitors to malicious sites, injecting advertisements, or stealing session cookies. The attacker could also perform actions on behalf of the target if the privilege level permits, escalating the impact within the WordPress administrative context.

The vulnerability has a CVSS v3 score of 7.1 (High) and is considered at risk for mass exploitation campaigns [1]. As of the publication date, no official patch is available, but the Patchstack advisory provides a mitigation rule to block attacks [1]. Immediate action is advised: update the plugin if a patched version becomes available, or apply the suggested virtual patch from security providers [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.