VYPR
Medium severity6.5NVD Advisory· Published Nov 21, 2025· Updated Apr 27, 2026

CVE-2025-66111

CVE-2025-66111

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nelio Software Nelio Popups nelio-popups allows Stored XSS.This issue affects Nelio Popups: from n/a through <= 1.3.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Nelio Popups WordPress plugin <=1.3.0 is vulnerable to stored cross-site scripting, allowing authenticated attackers with contributor-level or above to inject persistent scripts.

Vulnerability

Analysis

The Nelio Popups plugin for WordPress contains a stored cross-site scripting (XSS) vulnerability in versions up to and including 1.3.0. The root cause is improper neutralization of user-supplied input during web page generation, which allows malicious script content to be stored and later executed in the context of other users' browsers [1].

Exploitation

Conditions

Exploitation requires an attacker to have at least contributor-level access to the WordPress site. The attacker can inject arbitrary JavaScript or HTML into popup content through the plugin's input fields. User interaction is required for successful exploitation — specifically, a victim (such as a site visitor or administrator) must view a page containing the crafted popup, causing the injected script to execute [1].

Impact

A successful attack could allow the attacker to perform actions such as redirecting visitors to malicious sites, displaying deceptive advertisements, stealing cookies, or defacing the website by injecting arbitrary HTML payloads. These attacks could be used in broader campaigns targeting thousands of WordPress sites [1].

Mitigation

The vulnerability is fixed in version 1.3.1 of the plugin. The vendor recommends updating immediately. For users unable to update, consulting the hosting provider for alternative mitigations is advised. The CVSS v3 score for this issue is 6.5 (Medium), and while the official advisory notes a low severity, proactive patching is recommended to prevent exploitation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.