VYPR
Medium severity6.5NVD Advisory· Published Jul 4, 2025· Updated Apr 23, 2026

CVE-2025-53566

CVE-2025-53566

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in osama.esh WP Visitor Statistics (Real Time Traffic) wp-stats-manager allows Stored XSS.This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through <= 7.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WP Visitor Statistics (Real Time Traffic) plugin allows authenticated attackers to inject malicious scripts, exploited in mass campaigns.

Vulnerability

Overview

The WP Visitor Statistics (Real Time Traffic) plugin for WordPress, up to version 7.8, contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This flaw allows an attacker with appropriate privileges to inject arbitrary web scripts or HTML into the plugin's pages, which are then stored and executed when other users access the affected functionality [1].

Attack

Vector and Requirements

Exploitation requires that a privileged user (such as an administrator) performs an action like clicking a malicious link or visiting a crafted page [1]. The attack is initiated by an authenticated attacker with the necessary role, and user interaction is required for the attack to succeed [1]. The CVSS v3 base score is 6.5 (Medium), reflecting the need for privileges and user interaction despite the potential for impactful script injection [1].

Impact

Successful exploitation allows an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, into the website [1]. These injected scripts execute when other users (including site visitors) access the compromised page, potentially leading to phishing, data theft, or further compromise of the site [1].

Mitigation

The vulnerability is fixed in version 7.9 of the plugin [1]. Users are strongly advised to update immediately, especially as this type of vulnerability is known to be used in mass-exploit campaigns targeting thousands of websites [1]. If updating is not possible, users should consult their hosting provider or a web developer for assistance [1]. Patchstack users can enable auto-updates for vulnerable plugins to stay protected [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.