VYPR
High severity7.1NVD Advisory· Published Mar 3, 2025· Updated Apr 23, 2026

CVE-2025-25132

CVE-2025-25132

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ravi Singh Visitor Details visitors-details allows Stored XSS.This issue affects Visitor Details: from n/a through <= 1.0.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Visitor Details WordPress plugin (<=1.0.1) allows attackers with low privileges to inject malicious scripts.

Vulnerability

Overview

The Visitor Details plugin for WordPress (versions up to and including 1.0.1) contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. The flaw exists in the visitors-details component, as reported by ravi Singh [1].

Exploitation

Details

Exploitation requires a user with low-level privileges (such as a subscriber or contributor) to inject a malicious script via an input field that is later displayed to other users, including site visitors. The vulnerability can be triggered when a privileged user performs an action like visiting a crafted page or submitting a form, making user interaction a prerequisite for successful compromise [1].

Potential

Impact

An attacker successfully exploiting this vulnerability can inject arbitrary HTML or JavaScript into the website's pages. This could lead to malicious redirects, advertisement injection, data theft, or other unwanted behaviors when visitors access the compromised site. Given the stored nature of the XSS, the payload remains persistent until manually removed [1].

Mitigation

Status

Patchstack has issued a mitigation rule to block attacks until an official patch is applied. Users are strongly advised to update the plugin immediately if a patched version becomes available, or to contact their hosting provider for assistance. The vulnerability is expected to be targeted in mass-exploit campaigns, highlighting the urgency of remediation [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.