Medium severity6.4OSV Advisory· Published Jun 17, 2025· Updated Apr 15, 2026
CVE-2025-5700
CVE-2025-5700
Description
The Simple Logo Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.9.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected products
1Patches
1d995b5d35e0ffixed wordfence vulnurbility for Id attribute
1 file changed · +7 −4
includes/Base/Shortcode.php+7 −4 modified@@ -26,12 +26,15 @@ public function register() function carousel_shortcode($atts = []) { // define attributes and their defaults - extract(shortcode_atts(array( - 'id' => '' - ), $atts)); + $atts = shortcode_atts(array( + 'id' => '' + ), $atts); + + $id = isset($atts['id']) ? absint($atts['id']) : false; + // if not id is found - if (empty($id)) { + if (!$id) { return '<p>Please make sure your carousel shortcode contains an ID.</p>'; } else { // enqueue our scripts
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/idesolutions/simple-logo-carousel/commit/d995b5d35e0fdc0a59307ce664e4ce1158b69bffnvd
- plugins.trac.wordpress.org/browser/simple-logo-carousel/trunk/includes/Base/Shortcode.phpnvd
- plugins.trac.wordpress.org/changeset/3312693/nvd
- wordpress.org/plugins/simple-logo-carousel/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/b25f939c-1dfe-4d4f-a27a-1f9022da6965nvd
News mentions
0No linked articles in our index yet.