CVE-2025-5843
Description
The Brandfolder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 5.0.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated Stored XSS in Brandfolder plugin <=5.0.19 via unsanitized 'id' parameter allows Contributor+ users to inject arbitrary scripts.
Root
Cause The Brandfolder WordPress plugin, in all versions up to and including 5.0.19, suffers from a Stored Cross-Site Scripting vulnerability. The flaw resides in insufficient input sanitization and output escaping of the id parameter, which is used in shortcodes like [Brandfolder id="..."] [1]. This allows malicious input to bypass filtering and be stored within the WordPress database.
Exploitation
To exploit this vulnerability, an attacker must have at least Contributor-level access to the WordPress site. The attacker injects a crafted payload into the id parameter of the Brandfolder shortcode when creating or editing a post or page. Once saved, the injected script is stored and will execute each time a user views the affected content [1]. Because the plugin relies on the Gutenberg editor and shortcode rendering, the malicious script becomes active on any page where the shortcode appears.
Impact
Successful exploitation results in arbitrary web script execution in the context of the victim's browser. This can lead to session hijacking, defacement, theft of sensitive tokens, or further privilege escalation within the WordPress admin. The stored nature of the XSS increases the reach, as any administrator, editor, or visitor encountering the compromised page may be affected [1].
Mitigation
As of the publication date (2025-07-16), a patched version has not been explicitly announced. Users are advised to restrict Contributor-level and higher access to trusted authors, and to consider disabling the Brandfolder plugin until an update is released. The vendor's support channels and the WordPress plugin directory should be monitored for security fixes [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=5.0.19
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/brandfolder/tags/5.0.19/brandfolder-integration.phpnvd
- plugins.trac.wordpress.org/browser/brandfolder/tags/5.0.20/brandfolder-integration.phpnvd
- wordpress.org/plugins/brandfolder/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/bedbe508-e879-4989-89a6-db909ecd35a8nvd
News mentions
0No linked articles in our index yet.