VYPR
High severity7.1NVD Advisory· Published Aug 20, 2025· Updated Apr 23, 2026

CVE-2025-48162

CVE-2025-48162

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in quantumcloud Simple Business Directory Pro simple-business-directory-pro allows Reflected XSS.This issue affects Simple Business Directory Pro: from n/a through <= 15.5.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Simple Business Directory Pro (≤15.5.1) allows attackers to inject malicious scripts via unvalidated input.

Vulnerability

Overview The Simple Business Directory Pro plugin for WordPress versions up to and including 15.5.1 suffers from a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. The flaw exists in the plugin's handling of user-supplied data, which fails to sanitize or escape input before embedding it in output pages. This allows an attacker to craft a malicious link that, when followed by an authenticated user, executes arbitrary HTML and JavaScript in the context of the victim's browser session.

Exploitation

Requirements Exploitation requires the victim to have at least some level of privilege (e.g., a subscriber or higher role) and to interact with a specially crafted URL, such as by clicking a link or visiting a crafted page [1]. The attacker does not need direct network access to the server but must trick an authenticated user into triggering the payload. Reflected XSS typically relies on social engineering to lure victims into clicking the malicious link, which then reflects the injected script back from the vulnerable web application.

Impact and

Risks Successful exploitation could allow an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, which would be executed when any visitor accesses the affected site [1]. This can lead to session hijacking, defacement, or theft of sensitive information. The vulnerability is considered moderately dangerous and is expected to become part of mass-exploit campaigns, targeting thousands of websites regardless of their traffic or popularity [1].

Mitigation

Status The vendor has released version 15.5.2, which resolves the vulnerability [1]. Users are strongly advised to update immediately. For those unable to update, a mitigation rule from Patchstack can block attacks until the patch is applied [1]. The CVSS v3 score is 7.1 (High), and user interaction is required for exploitation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.