VYPR
Medium severity6.5NVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68070

CVE-2025-68070

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vektor,Inc. VK Google Job Posting Manager vk-google-job-posting-manager allows Stored XSS.This issue affects VK Google Job Posting Manager: from n/a through <= 1.2.22.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in VK Google Job Posting Manager plugin (≤1.2.22) allows attackers to inject malicious scripts through unsanitized input.

Vulnerability

Overview

The VK Google Job Posting Manager plugin for WordPress (versions ≤1.2.22) contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This means that input provided through certain plugin fields is not sanitized before being stored and later displayed to users, allowing malicious scripts to be permanently injected into pages.

Attack

Vector and Exploitation

The vulnerability can be exploited by an attacker with contributor-level privileges or higher (the exact role is not specified but requires authenticated access). The attacker can inject a crafted payload—such as JavaScript—into a vulnerable field, which will then execute whenever an administrator or visitor views the affected page [1]. User interaction is required for exploitation in some scenarios (e.g., clicking a link), but the stored nature of the XSS means the malicious payload automatically runs when the page is loaded without additional user action.

Impact

Successful exploitation enables the attacker to perform arbitrary actions within the context of the victim's browser session, including redirecting users to malicious sites, displaying fraudulent advertisements, stealing session cookies, or defacing the website [1]. This can lead to reputational damage, data theft, or further compromise of the WordPress installation.

Mitigation and

Advisory

The vendor released version 1.2.23 which resolves the issue by properly sanitizing input. Users are strongly advised to update immediately [1]. For sites unable to update, consider restricting contributor roles and applying web application firewall rules. This vulnerability is listed in Patchstack's database and is considered a medium severity issue (CVSS 6.5) [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.