CVE-2025-66092
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bqworks Accordion Slider accordion-slider allows Stored XSS.This issue affects Accordion Slider: from n/a through <= 1.9.13.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Accordion Slider plugin (≤1.9.13) allows authenticated attackers to inject malicious scripts via improper input neutralization.
Vulnerability
Overview
The Accordion Slider plugin for WordPress versions 1.9.13 and earlier contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw enables attackers with contributor-level privileges or higher to inject arbitrary JavaScript or HTML into the plugin's slider content, which is then stored and executed when other users view the affected page.
Exploitation
Conditions
Exploitation requires an authenticated user with at least contributor role permissions to submit crafted input through the plugin's interface. The attack does not require direct user interaction from the victim beyond normal page viewing, but the initial injection step does require a privileged user action (e.g., saving slider settings) [1]. This makes the vulnerability suitable for mass exploitation campaigns targeting thousands of WordPress sites simultaneously.
Impact
Successful exploitation allows an attacker to execute arbitrary scripts in the context of a visitor's browser session. This can be used to redirect users to malicious sites, display unauthorized advertisements, steal session cookies, or deface the website [1]. The stored nature of the XSS means the payload persists across sessions, affecting all subsequent page loads, and can affect all site visitors until the malicious content is removed.
Mitigation
The vendor has released version 1.9.14 which resolves the vulnerability by properly sanitizing input before rendering [1]. Users are strongly advised to update immediately. For sites that cannot be updated, Patchstack users can enable auto-updates for vulnerable plugins. No workarounds other than updating or disabling the plugin are currently available [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=1.9.13+ 1 more
- (no CPE)range: <=1.9.13
- (no CPE)range: <=1.9.13
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.