CVE-2025-53566
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in osama.esh WP Visitor Statistics (Real Time Traffic) wp-stats-manager allows Stored XSS.This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through <= 7.8.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in WP Visitor Statistics (Real Time Traffic) plugin allows authenticated attackers to inject malicious scripts, exploited in mass campaigns.
Vulnerability
Overview
The WP Visitor Statistics (Real Time Traffic) plugin for WordPress, up to version 7.8, contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This flaw allows an attacker with appropriate privileges to inject arbitrary web scripts or HTML into the plugin's pages, which are then stored and executed when other users access the affected functionality [1].
Attack
Vector and Requirements
Exploitation requires that a privileged user (such as an administrator) performs an action like clicking a malicious link or visiting a crafted page [1]. The attack is initiated by an authenticated attacker with the necessary role, and user interaction is required for the attack to succeed [1]. The CVSS v3 base score is 6.5 (Medium), reflecting the need for privileges and user interaction despite the potential for impactful script injection [1].
Impact
Successful exploitation allows an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, into the website [1]. These injected scripts execute when other users (including site visitors) access the compromised page, potentially leading to phishing, data theft, or further compromise of the site [1].
Mitigation
The vulnerability is fixed in version 7.9 of the plugin [1]. Users are strongly advised to update immediately, especially as this type of vulnerability is known to be used in mass-exploit campaigns targeting thousands of websites [1]. If updating is not possible, users should consult their hosting provider or a web developer for assistance [1]. Patchstack users can enable auto-updates for vulnerable plugins to stay protected [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <= 7.8
- Range: <= 7.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.