CVE-2025-58826
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric Mann WP Publication Archive wp-publication-archive allows Stored XSS.This issue affects WP Publication Archive : from n/a through <= 3.0.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in WP Publication Archive plugin (≤3.0.1) allows attackers with contributor-level access to inject persistent malicious scripts.
Vulnerability
Overview
The WP Publication Archive plugin for WordPress, versions 3.0.1 and earlier, contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw allows an authenticated attacker with contributor-level privileges or higher to inject arbitrary JavaScript or HTML into the plugin's publication archive pages.
Exploitation
Details
To exploit this vulnerability, an attacker must first have a WordPress user account with at least the Contributor role. The attacker then crafts a malicious payload within a publication entry's title or content fields. When a site administrator or other privileged user views the affected archive page, the injected script executes in their browser session. This user interaction requirement is reflected in the CVSS-mandated and is reflected in the Medium (6.5) severity score [1].
Impact
Successful exploitation enables the attacker to perform actions such as redirecting visitors to malicious sites, displaying unauthorized advertisements, or stealing session cookies. Because the injected script is stored in the database, it affects every visitor who views the compromised archive page, making it suitable for mass-exploit campaigns targeting thousands of WordPress sites [1].
Mitigation
The vendor has not released a patched version as of the publication date. The recommended immediate action is to update the plugin to a version newer than 3.0.1 if available, or to disable the plugin until a fix is released. Site administrators unable to update should consider disabling the plugin or restricting contributor-level user accounts as a temporary workaround [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=3.0.1+ 1 more
- (no CPE)range: <=3.0.1
- (no CPE)range: <=3.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.