VYPR
High severity7.1NVD Advisory· Published Jul 16, 2025· Updated Apr 23, 2026

CVE-2025-46500

CVE-2025-46500

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ValvePress Wordpress Auto Spinner wp-auto-spinner allows Reflected XSS.This issue affects Wordpress Auto Spinner: from n/a through <= 3.26.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in the WordPress Auto Spinner plugin (≤3.26.0) allows attackers to inject malicious scripts via crafted requests.

Vulnerability

Overview

The WordPress Auto Spinner plugin (versions up to and including 3.26.0) contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation. The flaw exists in the wp-auto-spinner component, where attacker-controlled parameters are reflected back to the user without proper sanitization or encoding [1].

Exploitation

Prerequisites

An attacker can trigger this vulnerability by convincing a privileged user (e.g., an administrator) to click a specially crafted link or visit a malicious page. The attack requires user interaction — the victim must perform an action such as clicking a link, visiting a crafted URL, or submitting a form [1]. No prior authentication is needed to deliver the payload, but the target must be logged into the WordPress site for the reflected script to execute in an authenticated context.

Impact

Successful exploitation allows the attacker to inject arbitrary HTML and JavaScript into the victim's browser session. This can be used to serve redirects, display advertisements, steal session cookies, or perform other malicious actions on behalf of the authenticated user. The CVSS v3 score of 7.1 reflects the potential for significant impact on confidentiality, integrity, and availability [1].

Mitigation

The vendor has not yet released an official patch, but Patchstack has issued a virtual mitigation rule that blocks attacks until an update becomes available. Users are strongly advised to update the plugin to a patched version as soon as it is released, or to apply the temporary mitigation provided by security services [1]. Given that this vulnerability is likely to be exploited in mass campaigns, immediate action is recommended.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.