VYPR
High severity7.1NVD Advisory· Published Dec 18, 2025· Updated Apr 15, 2026

CVE-2025-64260

CVE-2025-64260

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marco Milesi ANAC XML Bandi di Gara avcp allows Reflected XSS.This issue affects ANAC XML Bandi di Gara: from n/a through <= 7.7.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in the ANAC XML Bandi di Gara WordPress plugin allows attackers to inject malicious scripts via unsanitized input, requiring user interaction.

Vulnerability

Overview

The ANAC XML Bandi di Gara WordPress plugin (up to version 7.7) suffers from a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation. This means the plugin fails to sanitize or escape certain input before including it in output, allowing an attacker to craft a malicious URL or request that, when clicked or submitted by a privileged user, injects arbitrary HTML or JavaScript into the page [1].

Exploitation

Prerequisites

Exploitation requires user interaction: a logged-in user with appropriate privileges must perform an action such as clicking a crafted link, visiting a maliciously prepared page, or submitting a specially crafted form. The vulnerability can be triggered without authentication from the attacker's side, but the victim user must have some level of access (e.g., administrator, editor) for the script to execute in the context of the WordPress admin panel or frontend, depending on the vulnerable parameter location [1].

Impact

Successful exploitation allows an attacker to inject arbitrary scripts, which can be used to perform redirections to malicious sites, display advertisements, steal session cookies, or deface the website. Since XSS can be used to perform actions on behalf of the victim user, it may lead to privilege escalation or further compromise of the WordPress site [1].

Mitigation

A patched version 7.7.1 has been released to resolve the vulnerability. Users are strongly advised to update immediately. If updating is not possible, a mitigation rule is available from Patchstack to block attacks until the plugin can be updated. Automatic updates are recommended for Patchstack users [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.