CVE-2025-68867
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in anibalwainstein Effect Maker effect-maker allows DOM-Based XSS.This issue affects Effect Maker: from n/a through <= 1.2.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated DOM-Based XSS vulnerability in the WordPress Effect Maker plugin (≤1.2.1) allows attackers to inject malicious scripts via improperly neutralized input.
Vulnerability
Overview
The Effect Maker plugin for WordPress (versions up to and including 1.2.1) suffers from a DOM-Based Cross-Site Scripting (XSS) vulnerability. The root cause is improper neutralization of user-controlled input during web page generation, allowing an attacker to inject arbitrary JavaScript into the DOM of a victim's browser. This is classified under CWE-79 and has a CVSS v3 score of 6.5 (Medium) [1].
Exploitation
Details
Exploitation requires user interaction—a privileged user must perform an action such as clicking a malicious link, visiting a crafted page, or submitting a form. Although the vulnerability can be initiated by an unauthenticated attacker, successful execution depends on a victim (e.g., an administrator) interacting with the crafted content. The attack is delivered via DOM manipulation, without requiring server-side request forgery or other network-level prerequisites [1].
Impact
An attacker able to exploit this flaw can inject scripts that execute in the context of the victim's session. This can lead to redirecting users to malicious sites, displaying unauthorized advertisements, stealing sensitive data, or performing actions on behalf of the impacted user. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of WordPress sites regardless of their traffic or popularity [1].
Mitigation
The vendor has not released an official patch as of the publication date. However, Patchstack has provided a virtual mitigation rule to block attacks until an official update is available and can be safely applied. As an immediate action, users should update the plugin if a patched version is released. If updating is not possible, consulting a hosting provider or web developer for assistance is recommended [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <= 1.2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.