CVE-2025-67927
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spencer Haws Link Whisper Free link-whisper allows Reflected XSS.This issue affects Link Whisper Free: from n/a through <= 0.8.8.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in Link Whisper Free ≤0.8.8 allows attackers to inject malicious scripts via user interaction.
Overview
CVE-2025-67927 is a reflected cross-site scripting (XSS) vulnerability in the Link Whisper Free WordPress plugin, affecting versions through 0.8.8. The root cause is improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary HTML and JavaScript into a page [1].
Exploitation
To exploit this vulnerability, an attacker must trick a privileged user (such as an administrator) into clicking a crafted link or visiting a specially prepared page that triggers the reflected XSS. This interaction requirement lowers the attack complexity but does not require authentication from the attacker's side—only a valid user action on the target site [1].
Impact
Successful exploitation could allow the attacker to execute arbitrary scripts in the context of the victim's browser. This can lead to session hijacking, redirection to malicious sites, display of advertisements, or other harmful actions that affect site visitors [1].
Mitigation
The vulnerability has been patched in version 0.8.9 of Link Whisper Free. Users are strongly advised to update immediately. Patchstack also provides a mitigation rule to block attacks until the update is applied [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=0.8.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.