VYPR
Medium severity5.9NVD Advisory· Published Sep 26, 2025· Updated Apr 23, 2026

CVE-2025-60185

CVE-2025-60185

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kontur.us kontur Admin Style kontur-admin-style allows Stored XSS.This issue affects kontur Admin Style: from n/a through <= 1.0.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in the WordPress plugin kontur Admin Style (≤1.0.4) allows attackers to inject arbitrary scripts that execute when privileged users interact with the admin interface.

Vulnerability

Overview CVE-2025-60185 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'kontur Admin Style', affecting versions from n/a through 1.0.4. The issue arises from improper neutralization of user-supplied input during web page generation, allowing an attacker to store malicious scripts that later execute in the context of an authenticated administrator's session [1].

Attack

Scenario Exploitation requires a user with at least contributor-level privileges to inject the malicious payload via a vulnerable input field. Upon submission, the payload is stored on the server and subsequently rendered in the admin interface. Successful execution depends on a privileged user (e.g., an administrator) performing an action such as visiting a crafted page or clicking a link that triggers the script — this user interaction is required for the attack to succeed [1].

The CVSS v3 score is 5.9 (Medium), reflecting the need for authenticated access and user interaction, but the potential for mass exploitation is notable because the plugin may be deployed on many sites, and the stored XSS can lead to wide-reaching effects like redirects, ad injections, or other HTML payloads [1].

Impact and

Remediation An attacker exploiting this vulnerability can inject arbitrary scripts into the WordPress admin area, potentially leading to session hijacking, defacement, or further compromise of the site. The vendor has released version 1.0.5 which fixes the issue. Users are strongly advised to update to the latest version immediately; Patchstack users can enable auto-updates for vulnerable plugins [1]. Although the severity is rated as medium, prompt patching is recommended to mitigate the risk of inclusion in mass-exploit campaigns.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.