CVE-2025-62742
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Curator.io Curator.io curatorio allows Stored XSS.This issue affects Curator.io: from n/a through <= 1.9.5.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in the Curator.io WordPress plugin up to 1.9.5 allows authenticated attackers to inject arbitrary scripts executed on visitors' browsers.
Root
Cause
CVE-2025-62742 describes a Stored Cross-Site Scripting (XSS) vulnerability found in the Curator.io WordPress plugin, versions *1.9.5 and earlier* (up to n/a). The plugin fails to properly neutralize user-supplied input during web page generation. This improper neutralization allows a privilege user (e.g., a contributor or higher) to inject malicious scripts that are stored on the server and later executed in the browsers of other users visiting the affected pages [1].
Exploitation
To exploit this vulnerability, an attacker must first have an authenticated account with sufficient privileges to add or edit content that utilizes the Curator.io plugin. The attack vector is Network and requires Low attack complexity. The user interaction required is actually on the part of the victim — a privileged user must perform an action (such as clicking a link or submitting a form) that triggers the stored payload. Once the malicious script is embedded, it will execute automatically for any guest or other user viewing the page [1].
Impact
Successful exploitation could allow the attacker to inject arbitrary HTML and JavaScript, leading to redirects, unwanted advertisements, content defacement, or theft of sensitive information such as session tokens. The CVSS v3 base score is 6.5 (Medium), indicating significant potential for harm, particularly in mass-exploit campaigns targeting thousands of WordPress sites simultaneously [1].
Mitigation
The vendor has released version 1.9.6 which resolves the vulnerability. Users are strongly advised to update immediately, or to enable auto-updates if using Patchstack. There is no workaround described for users who cannot upgrade [1].
As of the publication date, this issue is not yet listed on CISA's Known Exploited Vulnerabilities (KEV) catalog, but the advisory notes that similar XSS flaws are frequently used in mass attacks.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.9.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.