VYPR
Medium severity6.4NVD Advisory· Published Apr 24, 2025· Updated Apr 15, 2026

CVE-2025-3832

CVE-2025-3832

Description

The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘successredirect’ parameter in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The FuseDesk WordPress plugin up to version 6.7 is vulnerable to stored cross-site scripting via the 'successredirect' parameter, allowing authenticated attackers with Contributor-level access to inject arbitrary scripts.

The FuseDesk plugin for WordPress suffers from a stored cross-site scripting (XSS) vulnerability due to insufficient input sanitization and output escaping of the ‘successredirect’ parameter. This flaw exists in all versions up to and including 6.7, allowing untrusted data to be embedded within pages that are later rendered to users [1].

An authenticated attacker with at least Contributor-level access can exploit this by providing a crafted payload in the ‘successredirect’ parameter when creating or editing a page. The payload is stored on the server and executed in the browser of any user who subsequently views the affected page. No additional privileges or user interaction beyond page access is required for the exploit to trigger [1].

Successful exploitation enables the attacker to inject arbitrary web scripts, which can lead to session hijacking, credential theft, or defacement of the WordPress site. Since the scripts execute in the context of the victim’s session, the impact can be severe, particularly for administrative users [1].

The vulnerability has been addressed in version 6.7.1, released on April 23, 2025, which sanitizes redirect URLs to prevent XSS. Users are strongly advised to update to the latest version immediately. No workarounds are available for affected versions [1].

References
  1. FuseDesk

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.