VYPR
Medium severity6.5NVD Advisory· Published Dec 30, 2025· Updated Apr 27, 2026

CVE-2025-68991

CVE-2025-68991

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in xenioushk BWL Pro Voting Manager bwl-pro-voting-manager allows DOM-Based XSS.This issue affects BWL Pro Voting Manager: from n/a through <= 1.4.9.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DOM-based XSS in BWL Pro Voting Manager plugin (≤1.4.9) allows script injection via improper input neutralization.

Vulnerability

Overview The BWL Pro Voting Manager plugin for WordPress (versions up to and including 1.4.9) contains a DOM-based Cross-Site Scripting (XSS) vulnerability. The root cause is improper neutralization of user input during web page generation, allowing an attacker to inject arbitrary JavaScript code into the DOM of a victim's browser. [1]

Exploitation

Path Exploitation requires user interaction, such as clicking a malicious link or visiting a crafted page. The vulnerability can be triggered without authentication, though the reference notes that successful exploitation typically depends on a victim performing an action. The attack vector is over the network, with low complexity and no special privileges required beyond the ability to deliver a crafted payload to a user. [1]

Impact

A successful attack allows an attacker to execute arbitrary scripts in the context of the victim's session within the WordPress admin or frontend, depending on where the vulnerable functionality resides. This can lead to session hijacking, redirection to malicious sites, or injection of advertisements or other HTML payloads visible to site visitors. The CVSS score of 6.5 reflects the medium severity due to the need for user interaction and the potential for widespread abuse. [1]

Mitigation

The vendor has not released a patched version beyond 1.4.9 at the time of disclosure. Users are advised to update the plugin immediately if a fix becomes available, or to contact their hosting provider for assistance. The vulnerability is tracked in the Patchstack database and is flagged as a risk for mass exploitation campaigns. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.