VYPR
Medium severity6.5NVD Advisory· Published Sep 5, 2025· Updated Apr 23, 2026

CVE-2025-58826

CVE-2025-58826

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric Mann WP Publication Archive wp-publication-archive allows Stored XSS.This issue affects WP Publication Archive : from n/a through <= 3.0.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WP Publication Archive plugin (≤3.0.1) allows attackers with contributor-level access to inject persistent malicious scripts.

Vulnerability

Overview

The WP Publication Archive plugin for WordPress, versions 3.0.1 and earlier, contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw allows an authenticated attacker with contributor-level privileges or higher to inject arbitrary JavaScript or HTML into the plugin's publication archive pages.

Exploitation

Details

To exploit this vulnerability, an attacker must first have a WordPress user account with at least the Contributor role. The attacker then crafts a malicious payload within a publication entry's title or content fields. When a site administrator or other privileged user views the affected archive page, the injected script executes in their browser session. This user interaction requirement is reflected in the CVSS-mandated and is reflected in the Medium (6.5) severity score [1].

Impact

Successful exploitation enables the attacker to perform actions such as redirecting visitors to malicious sites, displaying unauthorized advertisements, or stealing session cookies. Because the injected script is stored in the database, it affects every visitor who views the compromised archive page, making it suitable for mass-exploit campaigns targeting thousands of WordPress sites [1].

Mitigation

The vendor has not released a patched version as of the publication date. The recommended immediate action is to update the plugin to a version newer than 3.0.1 if available, or to disable the plugin until a fix is released. Site administrators unable to update should consider disabling the plugin or restricting contributor-level user accounts as a temporary workaround [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.