VYPR
Medium severity6.4NVD Advisory· Published Jun 3, 2025· Updated Apr 15, 2026

CVE-2025-5116

CVE-2025-5116

Description

The WP Plugin Info Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘containerid’ parameter in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue is due to an incomplete patch for CVE-2025-31835.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The WP Plugin Info Card plugin for WordPress contains a Stored XSS vulnerability via the 'containerid' parameter, affecting all versions up to 5.3.1, with an incomplete patch for CVE-2025-31835.

The WP Plugin Info Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) due to insufficient input sanitization and output escaping in the 'containerid' parameter. The vulnerable code is located in the Shortcodes.php file, where user-supplied input is not properly filtered before being stored or rendered [1]. This vulnerability affects all versions up to and including 5.3.1, and represents an incomplete patch for the previously reported CVE-2025-31835.

Attack

Vector To exploit this vulnerability, an attacker must first authenticate to the WordPress instance with at least Contributor-level privileges. The attacker can then inject arbitrary web scripts through the 'containerid' parameter, which is processed by the plugin's shortcode functionality. The injected scripts are stored on the server and will execute automatically when any user (including administrators) accesses the affected page.

The impact of successful exploitation includes the ability to execute arbitrary JavaScript in the context of an authenticated user's session. This can lead to session hijacking, manipulation of page content, or redirection to malicious sites. Because the XSS is stored, the attack can persist until the malicious content is removed.

Mitigation

At the time of publication, a patched version has not been released, and users are advised to apply the vendor's fix when available. As a workaround, administrators may restrict Contributor-level capabilities or disable the plugin on untrusted sites until an update is deployed.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.