VYPR
Medium severity6.5NVD Advisory· Published May 23, 2025· Updated Apr 23, 2026

CVE-2025-46518

CVE-2025-46518

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in phpaddicted IGIT Related Posts With Thumb Image After Posts igit-related-posts-with-thumb-images-after-posts allows Stored XSS.This issue affects IGIT Related Posts With Thumb Image After Posts: from n/a through <= 4.5.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in IGIT Related Posts With Thumb Image After Posts plugin for WordPress allows attackers to inject malicious scripts via improper input neutralization.

Vulnerability

Overview

The IGIT Related Posts With Thumb Image After Posts plugin for WordPress (versions up to and including 4.5.3) contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of input during web page generation. This flaw allows an authenticated attacker with the required privileges to inject arbitrary web scripts or HTML into posts [1].

Exploitation

Details

To exploit this vulnerability, an attacker must have a privileged user role in the WordPress site. The attack requires user interaction, such as clicking a malicious link or visiting a crafted page, to trigger the stored payload. Once injected, the malicious script is stored on the server and executed when other users (including site visitors) access the affected page [1].

Impact

Successful exploitation enables an attacker to execute arbitrary HTML and JavaScript in the context of the victim's browser. This can be used to redirect users to malicious sites, display unauthorized advertisements, steal session cookies, or perform other malicious actions within the affected site's domain [1].

Mitigation

The vendor recommends updating the plugin to a patched version as soon as it becomes available. In the interim, users can apply a virtual mitigation rule from Patchstack to block exploitation attempts. Site administrators should also review active user permissions to ensure that only trusted users have the necessary privilege level to exploit this vulnerability [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.