VYPR
Medium severity6.5NVD Advisory· Published Feb 25, 2025· Updated Apr 23, 2026

CVE-2025-26980

CVE-2025-26980

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wired Impact Wired Impact Volunteer Management wired-impact-volunteer-management allows Stored XSS.This issue affects Wired Impact Volunteer Management: from n/a through <= 2.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Wired Impact Volunteer Management plugin via improper input neutralization, allowing script injection on WordPress sites.

Vulnerability

Overview

The Wired Impact Volunteer Management plugin for WordPress (versions up to 2.5) contains a stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation. This flaw allows an attacker with a privileged role (e.g., administrator or editor) to inject arbitrary JavaScript or HTML into the plugin's pages, which is then stored and executed when other users visit those pages. The vulnerability is classified as CWE-79 and carries a CVSS v3 score of 6.5 (Medium). [1]

Exploitation

Requirements

Exploitation requires a user with sufficient privileges (as defined by the plugin's roles) to inject malicious payloads through input fields that are not sanitized. The attacker must be authenticated and able to submit crafted data; the stored payload will trigger when any user (including unauthenticated visitors) accesses the affected page. User interaction is not required from the victim beyond browsing to the infected page. [1]

Impact

Successful exploitation enables an attacker to execute arbitrary scripts in the browser context of visitors, leading to potential data theft, session hijacking, defacement, redirection to malicious sites, or injection of advertisements. Because the XSS is stored, the payload persists and affects all subsequent visitors until the malicious content is removed. [1]

Mitigation

The vendor has released version 2.5.1 which fixes the vulnerability by properly sanitizing user input. Administrators are strongly advised to update the plugin immediately. For sites unable to update, a temporary workaround is to disable the plugin or restrict access to the vulnerable functionality until patching is possible. The advisory notes that while the severity is medium, such vulnerabilities are frequently leveraged in mass exploitation campaigns against WordPress sites. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.