VYPR
High severity7.1NVD Advisory· Published Nov 6, 2025· Updated Apr 27, 2026

CVE-2025-49905

CVE-2025-49905

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PluginsCafe Range Slider Addon for Gravity Forms range-slider-addon-for-gravity-forms allows Reflected XSS.This issue affects Range Slider Addon for Gravity Forms: from n/a through <= 1.1.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Range Slider Addon for Gravity Forms WordPress plugin versions <=1.1.6 allows attackers to inject malicious scripts via crafted requests.

The vulnerability is a reflected Cross-Site Scripting (XSS) issue in the Range Slider Addon for Gravity Forms WordPress plugin, affecting versions up to and including 1.1.6 [1]. The root cause is improper neutralization of user-supplied input during web page generation, which allows an attacker to inject arbitrary HTML and JavaScript into the page [1].

Exploitation requires user interaction, such as clicking a malicious link or visiting a crafted page [1]. This can be initiated by any unauthenticated user, but successful execution depends on a privileged user (e.g., administrator) performing an action, such as clicking a specially crafted URL [1]. The attack vector is via the network, and no authentication is needed to deliver the payload, though user interaction is required for the payload to execute.

A successful attack could allow an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, which would execute when visitors access the affected site [1]. This could lead to data theft, defacement, or further compromise of the WordPress installation.

The vulnerability has been patched in version 1.1.7 of the plugin [1]. Users are strongly advised to update immediately. As an interim measure, Patchstack users can apply a mitigation rule to block attacks until the update is applied [1]. The vulnerability is considered moderately dangerous and is expected to be exploited in mass campaigns [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.