VYPR
High severity7.1NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-68846

CVE-2025-68846

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paris Holley Asynchronous Javascript asynchronous-javascript allows Reflected XSS.This issue affects Asynchronous Javascript: from n/a through <= 1.3.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WordPress Asynchronous Javascript plugin ≤1.3.5 allows attackers to inject malicious scripts via unneutralized input.

Vulnerability

Overview

The Asynchronous Javascript plugin for WordPress, versions up to and including 1.3.5, contains a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This means the plugin fails to sanitize or escape certain parameters before including them in the response, allowing an attacker to inject arbitrary HTML and execute arbitrary HTML and JavaScript in the context of a victim's browser session.

Exploitation

Prerequisites

Exploitation requires user interaction — a privileged users must click a crafted link, visit a specially prepared page, or submit a malicious form [1]. The attack does not require authentication from the attacker, but the victim must be logged into the WordPress admin area or have a role that can trigger the vulnerable functionality. The reflected nature of the XSS means the payload is delivered via a URL or form submission and executed immediately in the victim's browser.

Impact

Successful exploitation allows an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, which execute when other users visit the affected site [1]. This can lead to session hijacking, defacement, or phishing attacks against site visitors. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of websites regardless of size or popularity [1].

Mitigation

Users should update the plugin immediately once a patched version becomes available. As a temporary measure, Patchstack has issued a mitigation rule to block attacks until an official patch can be tested and safely applied [1]. If updating is not possible, site administrators should contact their hosting provider or web developer for assistance.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.