VYPR
Medium severity6.5NVD Advisory· Published Oct 27, 2025· Updated Apr 27, 2026

CVE-2025-62911

CVE-2025-62911

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rock Content Rock Convert rock-convert allows Stored XSS.This issue affects Rock Convert: from n/a through <= 3.0.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Rock Convert WordPress plugin allows attackers with low privileges to inject malicious scripts, impacting sites running version 3.0.1 or earlier.

Vulnerability

Analysis

The Rock Convert plugin for WordPress, versions through 3.0.1, contains a stored cross-site scripting (XSS) vulnerability [1]. The issue stems from improper neutralization of user-supplied input during web page generation. This allows an authenticated user with low-level privileges to inject arbitrary JavaScript or HTML into pages that will later be served to other visitors [1].

Exploitation

To exploit this vulnerability, an attacker must have at least contributor-level access to the WordPress site. The stored XSS script is triggered when a privileged user (such as an administrator) performs an action on a crafted page, typically by visiting the affected page or clicking a malicious link embedded in the content [1]. No additional authentication bypass is needed beyond the initial low-privilege account.

Impact

Successful exploitation enables the attacker to execute malicious scripts in the context of the administrator's session. This can lead to session hijacking, forced redirects to malicious sites, injection of unwanted advertisements, or other actions that compromise the integrity and confidentiality of the website and its visitors [1]. The vulnerability is actively used in mass-exploit campaigns targeting thousands of WordPress sites [1].

Mitigation

The vulnerability is present in all versions of Rock Convert from n/a through 3.0.1. Users are strongly advised to update the plugin to the latest patched version as soon as possible. If an update is not available or cannot be applied immediately, site administrators should consider temporarily disabling the plugin or implementing a web application firewall rule to block XSS payloads [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.