VYPR
Medium severity5.9NVD Advisory· Published Aug 14, 2025· Updated Apr 23, 2026

CVE-2025-53581

CVE-2025-53581

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in artiosmedia RSS Feed Pro rss-feed-pro allows Stored XSS.This issue affects RSS Feed Pro: from n/a through <= 1.1.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in RSS Feed Pro plugin for WordPress (≤1.1.8) allows attackers to inject malicious scripts via improper input neutralization.

Vulnerability

Overview CVE-2025-53581 is a Stored Cross-Site Scripting (XSS) vulnerability in the RSS Feed Pro plugin for WordPress, affecting versions from n/a through 1. through 1.1.8. The root cause is improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary HTML and JavaScript code that persists on the server [1].

Exploitation

Prerequisites and Attack Vector Exploitation requires a privileged user (e.g., an administrator or editor) to perform an action such as clicking a crafted link or submitting a form. The vulnerability is initiated by a role with sufficient privileges, but successful execution depends on user interaction from that privileged role [1]. This type of vulnerability is a stored XSS, meaning the injected payload is permanently stored and executed when any visitor accesses the affected page.

Impact

An attacker who successfully exploits this vulnerability can inject malicious scripts, including redirects, advertisements, and other HTML payloads. These scripts execute in the context of the victim's browser when they visit the compromised site, potentially leading to session hijacking, defacement, or phishing attacks [1].

Mitigation

The vendor has released version 1.1.9 which resolves the issue. Users are strongly advised to update to this version immediately. Patchstack users can enable auto-updates for vulnerable plugins. While the severity is rated Medium (CVSS 5.9), the vulnerability is known to be used in mass-exploit campaigns, so prompt patching is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.