CVE-2025-63072
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in THEMECO Cornerstone cornerstone allows Stored XSS.This issue affects Cornerstone: from n/a through <= 7.7.3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Cornerstone plugin (≤7.7.3) allows attackers with contributor+ access to inject malicious scripts executed on visitors' visitors' browsers.
Vulnerability
Overview
CVE-2025-63072 is a stored cross-site scripting (XSS) vulnerability in the Cornerstone plugin for WordPress, affecting versions from n/a through 7.7.3. The root cause is improper neutralization of user-supplied input during web page generation, allowing an authenticated attacker with contributor-level privileges or higher to inject arbitrary JavaScript or HTML and JavaScript into the plugin's content [1].
Exploitation
To exploit this vulnerability, an attacker must have at least a Contributor role on the target WordPress site. The attacker can then craft a malicious payload that is stored in the plugin's data and later executed when any visitor (including administrators or regular users load the affected page. The attack does not require direct user interaction from the victim beyond normal page viewing, though the Patchstack advisory notes that successful exploitation may require a privileged user to perform an action such as clicking a link or visiting a crafted page [1].
Impact
Successful exploitation allows the attacker to inject scripts that can perform actions such as redirecting visitors to malicious sites, displaying unauthorized advertisements, stealing session cookies, or defacing the website. This can lead to further compromise of the site and its users, and users [1].
Mitigation
The vulnerability is fixed in version 7.7.4 or later. Users are strongly advised to update the Cornerstone plugin immediately. If updating is not possible, site administrators should restrict contributor-level access and consider using a web application firewall to filter malicious input [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=7.7.3+ 1 more
- (no CPE)range: <=7.7.3
- (no CPE)range: <=7.7.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.