VYPR
High severity7.1NVD Advisory· Published Jul 16, 2025· Updated Apr 23, 2026

CVE-2025-47554

CVE-2025-47554

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress css3_web_pricing_tables_grids allows Reflected XSS.This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through <= 11.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in CSS3 Compare Pricing Tables plugin for WordPress (≤11.6) allows attackers to inject malicious scripts via crafted requests.

Vulnerability

The CSS3 Compare Pricing Tables for WordPress plugin (plugin name: css3_web_pricing_tables_grids) versions up to and including 11.6 suffer from a reflected cross-site scripting (XSS) vulnerability. The root cause is improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary HTML or JavaScript into a response [1].

Exploitation

Exploitation does not require authentication, as any unauthenticated user can trigger the vulnerability by crafting a malicious URL. However, successful attack requires the targeted user (e.g., an administrator or visitor) to interact with the crafted link—for example, by clicking it or visiting a specially crafted page. This interaction prerequisite is reflected in the CVSS score, which assigns a value of 7.1 (High) [1].

Impact

If exploited, the attacker can inject malicious scripts that execute in the context of the victim's browser. This can lead to session hijacking, defacement, redirection to malicious sites, or the injection of advertisements and other HTML payloads. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of WordPress installations [1].

Mitigation

The vulnerability has been addressed in version 11.7 of the plugin. Users are strongly advised to update to this version or later immediately. For those unable to update, Patchstack provides a virtual patching rule to block attacks until the update can be applied. No other workarounds have been published [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.