VYPR
Medium severity6.5NVD Advisory· Published Oct 27, 2025· Updated Apr 15, 2026

CVE-2025-62984

CVE-2025-62984

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPeka WP AdCenter wpadcenter allows Stored XSS.This issue affects WP AdCenter: from n/a through <= 2.6.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WP AdCenter plugin (≤2.6.1) lets low-privilege users inject malicious scripts that execute when visitors load pages.

WP AdCenter (WordPress plugin) versions through 2.6.1 are vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-62984. The root cause is improper neutralization of user-supplied input during web page generation, meaning that input fields or settings handled by the plugin do not sanitize or escape certain content before storing it in the database.

Attack

Vector and Requirements An attacker with authenticated access (at most a contributor or similar low-privileged role) can inject arbitrary HTML or JavaScript payloads into the plugin's storage. Successful exploitation requires that an administrative user performs an action—such as clicking a crafted link or visiting a prepared page—that loads the stored malicious content, triggering the script execution in the context of the admin's session [1].

Impact

If exploited, the attacker can inject scripts that, when executed, may perform actions like redirecting visitors to malicious sites, displaying unwanted advertisements, or stealing session cookies. Since the payload is stored, it affects all visitors who access the compromised page, not just the initial victim, amplifying the potential reach [1].

Mitigation

The vulnerability exists in all versions up to and including 2.6.1. The recommended immediate action is to update the WP AdCenter plugin to the latest patched version. If updating is not possible, users should contact their hosting provider or a web developer to apply temporary workarounds. The vulnerability has been reported to Patchstack and is considered used in mass-exploit campaigns, so prompt remediation is advised [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.