CVE-2025-58018
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Richard Leishman Mail Subscribe List mail-subscribe-list allows Stored XSS.This issue affects Mail Subscribe List: from n/a through <= 2.1.10.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in the Mail Subscribe List plugin (≤2.1.10) lets attackers inject malicious scripts that execute when visitors browse the site.
Vulnerability
Overview The Mail Subscribe List plugin for WordPress versions through 2.1.10 suffers from a stored cross-site scripting (XSS) vulnerability caused by improper neutralization of user-supplied input during web page generation [1]. This means the plugin fails to sanitize or escape input before it is stored and later displayed, allowing an attacker to inject arbitrary HTML or JavaScript payloads [1].
Exploitation
Conditions Exploitation requires a privileged user (such as an administrator) to perform some action — for example, clicking a crafted link or submitting a specially crafted form [1]. While the attacker may initiate the attack, successful injection depends on interaction from a user with the necessary roles [1]. Once the malicious payload is stored in the plugin's database, it will be executed in the browsers of any visitors to the affected page, including the administrator who triggered the storage [1].
Impact
An attacker can leverage this stored XSS to inject redirects, advertisements, or other arbitrary HTML payloads into the site [1]. The injected script could also be used to steal session cookies, deface the site, or perform other client-side attacks whenever a user visits the compromised page [1]. Because the vulnerability is stored, the malicious script persists and affects every visitor until the payload is removed.
Mitigation
The vendor has acknowledged the vulnerability, and the recommended action is to update the Mail Subscribe List plugin to a patched version (2.1.11 or later) as soon as possible [1]. If immediate update is not possible, site owners are advised to consult their hosting provider or web developer for interim security measures [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.1.10
- Range: <=2.1.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.