CVE-2025-46446
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ivanrojas Libro de Reclamaciones libro-de-reclamaciones allows Stored XSS.This issue affects Libro de Reclamaciones: from n/a through <= 1.0.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in the Libro de Reclamaciones WordPress plugin allows attackers with low privileges to inject malicious scripts executed when visitors view affected pages.
Vulnerability
Analysis
The Libro de Reclamaciones WordPress plugin (versions up to and including 1.0.1) contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This means the plugin fails to sanitize or escape certain input fields before storing them in the database, and later renders that data without proper encoding when displaying it to users.
Attack
Vector and Prerequisites
Exploitation requires the attacker to have a low-privileged role (such as a subscriber or contributor) that can submit or modify content through the plugin's forms [1]. User interaction is needed for exploitation to succeed—a privileged user (e.g., admin) must perform an action such as clicking a malicious link, visiting a specially crafted page, or submitting a form that triggers the stored script [1]. The payload is stored on the server and executes in the browsers of other users (including administrators) who visit the affected page.
Impact
Successful exploitation allows an attacker to inject arbitrary HTML and JavaScript into the vulnerable site [1]. This can lead to session hijacking, forced redirects to malicious sites, defacement, or injection of unwanted advertisements and other malicious content that will execute whenever guests visit the compromised page [1].
Mitigation
Status
As of the publication date, no official patch has been released for CVE-2025-46446 [1]. The Patchstack team has issued a virtual mitigation rule to block attempted attacks until a permanent fix becomes available and can be safely applied [1]. The recommended immediate action is to update the plugin as soon as a patched version is released; if updating is not possible, site owners should contact their hosting provider or web developer for assistance [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.