VYPR
Medium severity6.5NVD Advisory· Published Sep 22, 2025· Updated Apr 23, 2026

CVE-2025-59574

CVE-2025-59574

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Travel Engine WP Travel Engine wte-elementor-widgets allows Stored XSS.This issue affects WP Travel Engine: from n/a through <= 1.4.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WP Travel Engine wte-elementor-widgets plugin (≤1.4.2) allows attackers to inject malicious scripts via insufficient input sanitization.

Vulnerability

Analysis

The WP Travel Engine wte-elementor-widgets plugin for WordPress, versions <= 1.4.2, contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This means that input provided by authenticated users with certain privileges is not properly sanitized before being stored and later displayed to site visitors, allowing the injection of arbitrary HTML and JavaScript code.

Exploitation

An attacker with the required privilege level (typically a contributor or higher, as indicated by Patchstack) can submit crafted payloads that are stored in the plugin's database [1]. When other users or site visitors view the affected page, the malicious script executes in their browser. The attack requires user interaction, such as visiting a crafted page or submitting a form, but the stored nature of the XSS means the payload persists and can affect many visitors without additional trickery.

Impact

Successful exploitation allows the attacker to inject scripts that can perform actions like redirecting visitors to malicious sites, stealing session cookies, or displaying unauthorized advertisements and HTML content [1]. This can lead to reputational damage, loss of visitor trust, and potential further compromise of user accounts.

Mitigation

The vendor has released version 1.4.3 to address this vulnerability [1]. Users are strongly advised to update the plugin immediately. Patchstack recommends turning on auto-updates for vulnerable plugins. If updating is not possible, users should restrict the privileges of user roles that can input content and consult their hosting provider for assistance [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.