VYPR
Medium severity6.5NVD Advisory· Published Dec 29, 2025· Updated Apr 23, 2026

CVE-2025-68607

CVE-2025-68607

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template custom-field-template allows Stored XSS.This issue affects Custom Field Template: from n/a through <= 2.7.7.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Custom Field Template plugin (≤2.7.7) allows authenticated attackers to inject arbitrary scripts via unsanitized input.

Vulnerability

Overview

The Custom Field Template plugin for WordPress plugin (versions 2.7.7 and earlier) suffers from a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw enables attackers with contributor-level access or higher to inject malicious scripts that are stored on the server and later executed in the browsers of other users, including administrators and site visitors.

Exploitation

Details

Exploitation requires an attacker must have a WordPress user account with at least the Contributor role. The attacker injects a crafted payload into a custom field template, which is then stored and rendered without proper sanitization [1]. No additional user interaction is required for the initial injection, but the stored payload executes when a victim (e.g., an admin or visitor) views the affected page. The CVSS v3 base score of 6.5 reflects the medium severity, with the attack vector being network-based and requiring low privileges [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can be used to steal session cookies, redirect users to malicious sites, deface the site, or perform other actions on behalf of the authenticated user [1]. The vulnerability is particularly dangerous because it can be leveraged in mass-exploited across thousands of WordPress sites running the vulnerable plugin version.

Mitigation

The vendor has released version 2.7.8 which fixes the vulnerability by properly sanitizing input before storage [1]. Users are strongly advised to update immediately. For those unable to update, disabling the plugin or restricting contributor-level access may reduce risk. Patchstack users can enable auto-updates for vulnerable plugins [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.