CVE-2025-48365
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imaprogrammer Custom Comment customcomment allows Stored XSS.This issue affects Custom Comment: from n/a through <= 2.1.6.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Custom Comment plugin (≤2.1.6) lets attackers inject persistent scripts via comment input, leading to redirects and ads.
Vulnerability
Details
CVE-2025-48365 describes a stored cross-site scripting (XSS) vulnerability in the WordPress plugin Custom Comment (versions 2.1.6 and earlier). The plugin fails to properly neutralize user-supplied input during web page generation, allowing attackers to inject arbitrary scripts that are saved on the server and later executed in the browsers of visitors [1]. This is a classic improper output encoding flaw in the comment handling logic.
Exploitation
An attacker with the required privileges (typically a contributor or higher) can submit a crafted comment containing malicious JavaScript [1]. The payload is stored in the database and rendered on the comment page without sanitization. No additional user interaction from the victim is required besides visiting the affected page — the script executes automatically when the page loads. The attacker does not need to trick an admin into clicking a link; the stored payload is the delivery mechanism.
Impact
Successful exploitation enables the attacker to execute arbitrary JavaScript in the context of the victim's session. Common payloads include redirects to malicious sites, injection of unwanted advertisements, data theft via session hijacking, or defacement of the website [1]. Because the XSS is stored, every visitor to the affected page is at risk until the malicious content is removed.
Mitigation
The vulnerability is confirmed up to version 2.1.6. The recommended action is to update the plugin to a patched version if available. If updating is not possible, site administrators should disable or remove the plugin [1]. Hosting providers may assist in hardening or temporarily blocking the vulnerable functionality.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <= 2.1.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.