VYPR
Medium severity6.5NVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-63066

CVE-2025-63066

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in p-themes Porto Theme - Functionality porto-functionality allows Stored XSS.This issue affects Porto Theme - Functionality: from n/a through < 3.7.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Porto Theme - Functionality plugin allows authenticated attackers to inject malicious scripts into WordPress sites.

Vulnerability

Overview

The Porto Theme - Functionality WordPress plugin (porto-functionality) versions before 3.7.3 contain a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This flaw enables authenticated users with sufficient privileges to inject arbitrary JavaScript or HTML into pages that will be executed when visited by other users will execute the malicious payload [1].

Exploitation

Details

Exploitation requires a privileged user role such as an administrator or editor to submit crafted input through the plugin's functionality. The attacker does not need direct interaction from a victim administrator but the injected script will execute when any user including site visitors loads the affected page. The vulnerability is classified as Stored XSS meaning the payload persists in the database and affects all subsequent visitors [1].

Impact

A successful attack allows the injection of malicious scripts that can perform actions such as redirecting users to attacker-controlled sites displaying advertisements or stealing session cookies. This can lead to further compromise of the WordPress site including privilege escalation or defacement. The CVSS v3 score is 6.5 (Medium) reflecting the need for authenticated access but the potential for widespread harm [1].

Mitigation

The vendor has released version 3.7.3 which fixes the vulnerability. Users are strongly advised to update immediately. For those unable to update a temporary workaround may involve restricting access to the plugin's functionality or applying a web application firewall rule. Patchstack users can enable auto-updates for vulnerable plugins [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.