VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-23852

CVE-2025-23852

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in robin90 First Comment Redirect first-comment-redirect allows Reflected XSS.This issue affects First Comment Redirect: from n/a through <= 1.0.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WordPress First Comment Redirect plugin (<=1.0.3) allows unauthenticated attackers to inject arbitrary web scripts via improperly neutralized input.

Vulnerability

Analysis

The First Comment Redirect plugin for WordPress versions up to and including 1.0.3 suffers from a Reflected Cross-Site Scripting (XSS) vulnerability. The root cause is the improper neutralization of user-supplied input during web page generation, per the CVE description [1]. This means the plugin fails to sanitize or escape certain input before including it in a response, allowing an attacker to inject arbitrary HTML and JavaScript.

Attack

Vector

An attacker can exploit this issue by crafting a malicious link and tricking a user (e.g., a site administrator or visitor) into clicking it. While the input is reflected, the attack requires user interaction — the victim must click the crafted link, visit a specially formed page, or submit a form [1]. No authentication is required to initiate the attack, making it accessible to unauthenticated remote attackers. The attack surface is the public-facing web page generated by the plugin.

Impact

If successfully exploited, the attacker can inject malicious scripts that execute in the context of the victim's browser. This could lead to session hijacking, defacement, redirection to malicious sites, or injection of advertisements and other HTML payloads [1]. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of websites regardless of traffic or popularity.

Mitigation

The vulnerability affects all versions from n/a through 1.0.3. Users are urged to update the plugin immediately if a patched version becomes available. As of the publication date (2025-03-03), no official patch is mentioned, but Patchstack has issued a mitigation rule to block attacks until a fix can be safely applied [1]. Administrators unable to update should consult their hosting provider or web developer for assistance.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.