VYPR
Medium severity6.5NVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2025-63072

CVE-2025-63072

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in THEMECO Cornerstone cornerstone allows Stored XSS.This issue affects Cornerstone: from n/a through <= 7.7.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Cornerstone plugin (≤7.7.3) allows attackers with contributor+ access to inject malicious scripts executed on visitors' visitors' browsers.

Vulnerability

Overview

CVE-2025-63072 is a stored cross-site scripting (XSS) vulnerability in the Cornerstone plugin for WordPress, affecting versions from n/a through 7.7.3. The root cause is improper neutralization of user-supplied input during web page generation, allowing an authenticated attacker with contributor-level privileges or higher to inject arbitrary JavaScript or HTML and JavaScript into the plugin's content [1].

Exploitation

To exploit this vulnerability, an attacker must have at least a Contributor role on the target WordPress site. The attacker can then craft a malicious payload that is stored in the plugin's data and later executed when any visitor (including administrators or regular users load the affected page. The attack does not require direct user interaction from the victim beyond normal page viewing, though the Patchstack advisory notes that successful exploitation may require a privileged user to perform an action such as clicking a link or visiting a crafted page [1].

Impact

Successful exploitation allows the attacker to inject scripts that can perform actions such as redirecting visitors to malicious sites, displaying unauthorized advertisements, stealing session cookies, or defacing the website. This can lead to further compromise of the site and its users, and users [1].

Mitigation

The vulnerability is fixed in version 7.7.4 or later. Users are strongly advised to update the Cornerstone plugin immediately. If updating is not possible, site administrators should restrict contributor-level access and consider using a web application firewall to filter malicious input [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.