VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23850

CVE-2025-23850

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mojowill Mojo Under Construction mojo-under-construction allows Reflected XSS.This issue affects Mojo Under Construction: from n/a through <= 1.1.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in the Mojo Under Construction plugin (≤1.1.2) allows attackers to inject malicious scripts via crafted requests.

Vulnerability

Overview The Mojo Under Construction plugin for WordPress versions up to and including 1.1.2 contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during page generation. This means that user-supplied data is not properly sanitized before being included in the output, allowing an attacker to inject arbitrary HTML or JavaScript code into the response [1].

Exploitation

Method The vulnerability is classified as reflected XSS, requiring user interaction from a privileged user (such as an administrator) who must click a malicious link, visit a specially crafted page, or submit a form. The attack can be initiated by an unauthenticated or low-privileged user, but exploitation depends on a higher-privileged user performing an action that triggers the reflected payload [1]. This makes the attack vector plausible in mass-exploit campaigns targeting thousands of WordPress sites [1].

Impact

If successfully exploited, the attacker can inject malicious scripts that execute in the context of the victim's browser. This may lead to actions such as redirecting visitors to malicious sites, displaying unwanted advertisements, or stealing sensitive information like session cookies. The CVSS v3 score of 7.1 (High) reflects the moderate impact and the requirement for user interaction [1].

Mitigation

The official advice is to update the plugin to a patched version immediately if available; as of the advisory, no automatic patch has been released. For immediate protection, Patchstack provides a mitigation rule that blocks attacks until an official update can be tested and safely applied [1]. Users unable to update are advised to contact their hosting provider or web developer for assistance.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.