CVE-2025-27266
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ignacio Perez Hover Image Button hover-image-button allows DOM-Based XSS.This issue affects Hover Image Button: from n/a through <= 1.1.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
DOM-based XSS in Hover Image Button plugin (≤1.1.2) allows attackers to inject malicious scripts via unneutralized input, affecting WordPress sites.
Vulnerability
Overview
The Hover Image Button plugin for WordPress, versions up to and including 1.1.2, contains a DOM-based Cross-Site Scripting (XSS) vulnerability caused by improper neutralization of user input during web page generation [1]. This flaw allows an attacker to inject arbitrary JavaScript code that executes in the context of a victim's browser when visiting an affected page.
Exploitation
Details
Exploitation requires a privileged user (e.g., an administrator or editor) to perform an action such as clicking a crafted link or submitting a malicious form [1]. The attack vector is network-based with low complexity and no authentication requirements for the attacker, though user interaction is needed to trigger the payload. The vulnerability is classified as DOM-based, meaning the malicious payload modifies the DOM environment in the victim's browser without being reflected in the server response.
Impact
Successful exploitation enables an attacker to execute arbitrary scripts, redirect users to phishing sites, display unwanted advertisements, or steal sensitive information such as session cookies [1]. While the CVSS score of 6.5 reflects a medium severity, the plugin's widespread use makes it attractive for mass-exploit campaigns targeting thousands of websites [1].
Mitigation
The vendor has not released a patched version at the time of publication. Users are advised to immediately update the plugin if a fix becomes available, or contact their hosting provider for assistance. As a workaround, consider disabling the plugin until a security update is released [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.1.2
- Range: <= 1.1.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.