VYPR
Medium severity6.4OSV Advisory· Published Jun 17, 2025· Updated Apr 15, 2026

CVE-2025-5700

CVE-2025-5700

Description

The Simple Logo Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.9.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Affected products

1

Patches

1
d995b5d35e0f

fixed wordfence vulnurbility for Id attribute

1 file changed · +7 4
  • includes/Base/Shortcode.php+7 4 modified
    @@ -26,12 +26,15 @@ public function register()
         function carousel_shortcode($atts = [])
         {
             // define attributes and their defaults
    -        extract(shortcode_atts(array(
    -            'id' => ''
    -        ), $atts));
    +        $atts = shortcode_atts(array(
    +        'id' => ''
    +        ), $atts);
    +
    +        $id = isset($atts['id']) ? absint($atts['id']) : false;
    +        
     
             // if not id is found
    -        if (empty($id)) {
    +        if (!$id) {
                 return '<p>Please make sure your carousel shortcode contains an ID.</p>';
             } else {
                 // enqueue our scripts
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.