VYPR
High severity7.1NVD Advisory· Published May 23, 2025· Updated Apr 23, 2026

CVE-2025-46487

CVE-2025-46487

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sftranna EC Authorize.net ec-authorizenet allows Reflected XSS.This issue affects EC Authorize.net: from n/a through <= 0.3.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in EC Authorize.net WordPress plugin (≤0.3.3) allows attackers to inject arbitrary scripts via unneutralized input.

Vulnerability

Overview CVE-2025-46487 is a reflected Cross-Site Scripting (XSS) vulnerability found in the EC Authorize.net plugin for WordPress, affecting versions from 0.0.0 through 0.3.3. The root cause is improper neutralization of user-supplied input during web page generation, enabling an attacker to inject malicious scripts that are reflected back to the user's browser [1].

Exploitation

Details Exploitation requires user interaction — a privileged user, such as an administrator, must click a specially crafted link or visit a maliciously constructed page. No prior authentication for the attacker is specified; the attack is remote and can be launched against any website running the vulnerable plugin. The reflected nature means the payload is executed immediately in the context of the victim's session, bypassing same-origin protections [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can lead to session hijacking, redirection to malicious sites, defacement, or theft of sensitive information. Given that this vulnerability is expected to be used in mass-exploit campaigns, it poses a significant risk to all affected WordPress installations, regardless of size or popularity [1].

Mitigation

No official patch is available for versions up to 0.3.3. Patchstack has released a mitigation rule to block attacks until an update is applied. The immediate recommended action is to update the plugin to a patched version if available, or alternatively, seek assistance from a hosting provider or web developer to implement a virtual patch or disable the plugin [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.