CVE-2025-6261
Description
The Fleetwire Fleet Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's fleetwire_list shortcode in all versions up to, and including, 1.0.19 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated Stored XSS in Fleetwire Fleet Management plugin via unsanitized shortcode attributes allows script injection.
The Fleetwire Fleet Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to and including 1.0.19. The vulnerability exists in the fleetwire_list shortcode, where user-supplied attributes are not properly sanitized or escaped before being output. This allows attackers to inject arbitrary HTML and JavaScript code into pages that include the shortcode [1].
Exploitation requires an authenticated user with at least contributor-level access. The injected script is stored in the page and executed whenever any user visits the affected page. No other special privileges or network access are needed beyond the ability to create or edit posts with shortcodes [1].
Successful exploitation enables an attacker to execute arbitrary web scripts in the context of the victim's browser. Potential impact includes session hijacking, defacement, redirection to malicious sites, or theft of sensitive information. The attack can target site administrators, leading to full compromise of the WordPress installation [1].
As of the publication date, the vulnerability remains unpatched in version 1.0.19 and earlier. Users are advised to update to the latest version of the plugin if a patched version becomes available. Until then, limiting contributor-level access and reviewing shortcode usage may reduce risk [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=1.0.19
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.