CVE-2025-63057
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roxnor Wp Ultimate Review wp-ultimate-review allows DOM-Based XSS.This issue affects Wp Ultimate Review: from n/a through <= 2.3.7.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
DOM-based XSS in WP Ultimate Review plugin <=2.3.7 allows attackers to inject malicious scripts via crafted input, requiring user interaction.
The WP Ultimate Review plugin for WordPress is vulnerable to a DOM-based Cross-Site Scripting (XSS) vulnerability in versions up to and including 2.3.7. This flaw arises from improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary JavaScript into the DOM of a victim's browser [1].
Exploitation requires a privileged user (such as an administrator) to perform an action, such as clicking a malicious link, visiting a crafted page, or submitting a specially crafted form. The attack surface is the plugin's review functionality, where unsanitized input can be stored and later executed in the context of the victim's session [1].
Successful exploitation enables an attacker to inject malicious scripts, including redirects, advertisements, and other HTML payloads, which are executed when other users visit the affected site. This can lead to session hijacking, defacement, or further compromise of the WordPress installation [1].
The vulnerability has been addressed in version 2.3.8 of the plugin. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins to ensure protection [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=2.3.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.