VYPR
High severity7.1NVD Advisory· Published May 23, 2025· Updated Apr 28, 2026

CVE-2025-47613

CVE-2025-47613

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mojoomla School Management allows Reflected XSS. This issue affects School Management: from n/a through 92.0.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in the School Management WordPress plugin (≤92.0.0) allows attackers to inject malicious scripts via unneutralized input.

Vulnerability

Overview

The School Management WordPress plugin, through version 92.0.0, fails to properly neutralize user-supplied input during web page generation. This flaw constitutes a reflected Cross-Site Scripting (XSS) vulnerability [1]. The root cause is the lack of sanitization or escaping of input that is immediately reflected back to the user's browser.

Exploitation

Path

An attacker can exploit this vulnerability by crafting a malicious link or form that, when interacted with by a privileged user (such as a site administrator), executes arbitrary JavaScript in the victim's browser. The attack does not require authentication from the attacker, but it does rely on user interaction from a user who has some level of privileges [1]. The exploitation is straightforward and can be automated, making it suitable for mass campaigns targeting thousands of sites [1].

Impact

Successful exploitation allows the attacker to inject arbitrary HTML and JavaScript into the context of the vulnerable website. This can be used to perform actions such as redirecting visitors to malicious sites, displaying unauthorized advertisements, stealing session cookies, or defacing pages [1]. The CVSS v3 base score is 7.1 (High), reflecting the potential for significant impact with relatively low attack complexity [1].

Mitigation

The vendor has not yet released an official patch, but Patchstack provides a mitigation rule that can block attacks until a fix is available and safely applied. Users are strongly advised to update the plugin to a patched version once released. If updating is not immediately possible, consulting with a hosting provider or web developer for temporary workarounds is recommended [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.