CVE-2025-68991
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in xenioushk BWL Pro Voting Manager bwl-pro-voting-manager allows DOM-Based XSS.This issue affects BWL Pro Voting Manager: from n/a through <= 1.4.9.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
DOM-based XSS in BWL Pro Voting Manager plugin (≤1.4.9) allows script injection via improper input neutralization.
Vulnerability
Overview The BWL Pro Voting Manager plugin for WordPress (versions up to and including 1.4.9) contains a DOM-based Cross-Site Scripting (XSS) vulnerability. The root cause is improper neutralization of user input during web page generation, allowing an attacker to inject arbitrary JavaScript code into the DOM of a victim's browser. [1]
Exploitation
Path Exploitation requires user interaction, such as clicking a malicious link or visiting a crafted page. The vulnerability can be triggered without authentication, though the reference notes that successful exploitation typically depends on a victim performing an action. The attack vector is over the network, with low complexity and no special privileges required beyond the ability to deliver a crafted payload to a user. [1]
Impact
A successful attack allows an attacker to execute arbitrary scripts in the context of the victim's session within the WordPress admin or frontend, depending on where the vulnerable functionality resides. This can lead to session hijacking, redirection to malicious sites, or injection of advertisements or other HTML payloads visible to site visitors. The CVSS score of 6.5 reflects the medium severity due to the need for user interaction and the potential for widespread abuse. [1]
Mitigation
The vendor has not released a patched version beyond 1.4.9 at the time of disclosure. Users are advised to update the plugin immediately if a fix becomes available, or to contact their hosting provider for assistance. The vulnerability is tracked in the Patchstack database and is flagged as a risk for mass exploitation campaigns. [1]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.4.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.