CVE-2025-4369
Description
The Companion Auto Update plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘update_delay_days’ parameter in all versions up to, and including, 3.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Companion Auto Update plugin via 'update_delay_days' parameter allows admin-level attackers to inject scripts on multisite or sites with unfiltered_html disabled.
The Companion Auto Update plugin for WordPress is vulnerable to stored cross-site scripting (XSS) due to insufficient input sanitization and output escaping on the 'update_delay_days' parameter [1]. This affects all versions up to and including 3.9.2. The vulnerability stems from the plugin's failure to properly sanitize user input before storing it and later rendering it in pages, allowing arbitrary script injection.
Exploitation requires an attacker with administrator-level access, but only on multi-site installations or where the 'unfiltered_html' capability has been disabled [1]. The attacker can inject arbitrary web scripts via the 'update_delay_days' parameter, which will be stored and executed whenever a user accesses the affected page. This means the attack surface is limited to environments with the mentioned configurations.
The impact of successful exploitation is the execution of malicious scripts in the context of the administrator's session. This could lead to actions such as creating new admin accounts, defacing the site, or stealing sensitive information like cookies and session tokens [1]. The vulnerability is classified as medium severity with a CVSS score of 5.5.
As of the publication date, no patch has been released, but users are advised to update the plugin when a new version becomes available [1]. Administrators should also review their site's configuration, ensuring 'unfiltered_html' is properly restricted, especially on multi-site installations, to mitigate the risk.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=3.9.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.