VYPR
Medium severity6.5NVD Advisory· Published Sep 22, 2025· Updated Apr 23, 2026

CVE-2025-57993

CVE-2025-57993

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Benjamin Pick Geolocation IP Detection geoip-detect allows Stored XSS.This issue affects Geolocation IP Detection: from n/a through <= 5.5.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WordPress Geolocation IP Detection plugin ≤5.5.0 allows attackers to inject malicious scripts via improper input neutralization, requiring privileged user interaction.

Vulnerability

Overview

The vulnerability is a Stored Cross-Site Scripting (XSS) in the WordPress Geolocation IP Detection plugin (geoip-detect) by Benjamin Pick. The root cause is improper neutralization of user-supplied input during web page generation, allowing an attacker to store malicious scripts that later execute in the context of a victim's browser. This affects all versions from n/a through 5.5.0 [1].

Exploitation

Conditions

Exploitation requires a privileged user (e.g., an administrator) to perform an action such as clicking a malicious link, visiting a crafted page, or submitting a form. The attacker does not need direct access to the site but must trick a privileged user into triggering the stored payload. Once stored, the malicious script executes when any visitor accesses the affected page [1].

Impact

Successful exploitation allows an attacker to inject arbitrary HTML and JavaScript, which can be used to redirect visitors to malicious sites, display advertisements, steal session cookies, or deface the website. The CVSS v3 score is 6.5 (Medium), indicating a moderate risk due to the requirement for user interaction [1].

Mitigation

The vendor has released version 5.6.0 which fixes the vulnerability. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins. No workaround is available; updating is the only recommended action [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.