CVE-2025-64291
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Premmerce Premmerce User Roles premmerce-user-roles allows Stored XSS.This issue affects Premmerce User Roles: from n/a through <= 1.0.13.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS vulnerability in Premmerce User Roles WordPress plugin allows authenticated attackers to inject malicious scripts.
Vulnerability
Overview The Premmerce User Roles plugin for WordPress versions up to and including 1.0.13 suffers from a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This allows an authenticated attacker with sufficient privileges to inject arbitrary JavaScript or HTML into the plugin's pages, which is then stored and executed in the browsers of other users visiting the affected site.
Exploitation
Conditions Exploitation requires an authenticated user with the appropriate role (as defined by the plugin) to inject the malicious payload. The vulnerability is triggered when a privileged user performs an action such as clicking a link or submitting a form, but the stored script will execute for any visitor to the compromised page [1]. This makes it a stored XSS, which is more dangerous than reflected XSS as it persists without requiring further user interaction from the victim.
Impact
Successful exploitation could allow an attacker to inject malicious scripts that perform actions such as redirecting visitors to malicious sites, displaying unauthorized advertisements, or stealing session cookies and other sensitive information [1]. The CVSS score of 5.9 (Medium) reflects the need for authenticated access but the potential for widespread impact on site visitors.
Mitigation
The vulnerability has been patched in version 1.0.14 of the plugin. Users are strongly advised to update immediately. For those unable to update, consulting with a hosting provider or web developer is recommended [1]. Patchstack users can enable auto-updates for vulnerable plugins.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=1.0.13+ 1 more
- (no CPE)range: <=1.0.13
- (no CPE)range: <= 1.0.13
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.