VYPR
Medium severity6.5NVD Advisory· Published Dec 9, 2025· Updated Apr 23, 2026

CVE-2025-63050

CVE-2025-63050

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sizam REHub Framework rehub-framework allows Stored XSS.This issue affects REHub Framework: from n/a through < 19.9.9.7.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in REHub Framework plugin (versions < 19.9.9.7) allows attackers to inject malicious scripts via improper input neutralization.

Vulnerability

Overview

The REHub Framework WordPress plugin (versions prior to 19.9.9.9.9.7) contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw enables an attacker with sufficient privileges to inject arbitrary JavaScript or HTML payloads that persist on the server and execute in the database.

Exploitation

Prerequisites

Exploitation requires a privileged user role (such as an editor or administrator) to perform an) to perform an action — for example, clicking a crafted link or submitting a specially prepared form [1]. The attacker does not need direct access to the server; instead, they rely on social engineering to trick a legitimate user into triggering the payload. Once the injected script is stored, it executes automatically when any visitor loads the affected page.

Impact

Successful exploitation allows an attacker to execute malicious scripts in the context of the victim's browser. This can be used to redirect visitors to malicious sites, display unauthorized advertisements, steal session cookies, or deface the website [1]. The vulnerability is considered vulnerability has a CVSS v3 score of 6.5 (Medium), indicating a moderate severity but with potential for widespread abuse in mass-exploit campaigns.

Mitigation

The vendor has released version 19.9.9.7 which resolves the issue [1]. Users are strongly advised to update immediately. For those unable to update, consulting a hosting provider or web developer is recommended. Patchstack users can enable auto-updates for vulnerable plugins only [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.