VYPR
High severity7.1NVD Advisory· Published Jul 16, 2025· Updated Apr 23, 2026

CVE-2025-48345

CVE-2025-48345

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in arisoft Contact Form 7 Editor Button cf7-editor-button allows Reflected XSS.This issue affects Contact Form 7 Editor Button: from n/a through <= 1.0.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Contact Form 7 Editor Button plugin (<=1.0.0) allows attackers to inject malicious scripts via crafted links.

Vulnerability

Overview

A reflected Cross-Site Scripting (XSS) vulnerability exists in the WordPress plugin Contact Form 7 Editor Button (cf7-editor-button), affecting all versions up to and including 1.0.0. The issue stems from improper neutralization of user input during web page generation, allowing an attacker to inject arbitrary HTML and JavaScript into a page that will be reflected back to the user [1].

Exploitation

Prerequisites

Exploitation requires user interaction — a privileged user must click a crafted malicious link, visit a specially prepared page, or submit a form. This means the attacker must lure a site administrator or editor into interacting with the malicious payload. The vulnerability is classified as reflected XSS, and does not require prior authentication to deliver the exploit link [1].

Impact

Successful exploitation allows a malicious actor to inject harmful scripts, such as redirects, advertisements, or other HTML payloads. These scripts execute when other users (including site visitors) access the affected page, potentially leading to session hijacking, defacement, or further compromise of the WordPress site [1]. The CVSS v3.1 score is 7.1 (High), and the vulnerability is considered moderately dangerous, with expected inclusion in mass-exploit campaigns [1].

Mitigation

Patchstack has released a mitigation rule to block attacks until an official patch is available. Users are strongly advised to update the plugin as soon as a patched version is published, or to contact their hosting provider for assistance if an immediate update is not possible [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.