CVE-2025-69008
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Inboxify Inboxify Sign Up Form inboxify-sign-up-form allows Stored XSS.This issue affects Inboxify Sign Up Form: from n/a through <= 1.0.4.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Inboxify Sign Up Form plugin (<=1.0.4) allows attackers to inject malicious scripts executed when visitors browse a compromised WordPress site.
Root
Cause The vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Inboxify Sign Up Form plugin for WordPress, versions through 1.0.4 [1]. Improper neutralization of user input during web page generation allows an attacker to store arbitrary JavaScript or HTML payloads within the plugin's form data, which are later executed unsuspectingly in the context of a visitor's browser.
Exploitation
Exploitation requires a user with contributor-level privileges or higher to inject malicious code via the plugin's input fields [1]. While user interaction (e.g., clicking a link or visiting a crafted page) is needed to initiate the attack, the stored payload persists and affects any visitor who views the page containing the infected form.
Impact
Successful exploitation can lead to a wide range of malicious outcomes, including redirection to phishing or malware sites, injection of advertisements, defacement, or theft of session tokens and other sensitive data [1]. The vulnerability's CVSS v3 base score of 5.9 reflects a medium severity, and it is known to be used in mass-exploit campaigns targeting countless websites regardless of size or popularity.
Mitigation
The plugin vendor has not yet released a patch, and the vulnerability remains unpatched in all versions up to 1.0.4 [1]. As an immediate action, users are advised to update the plugin once a fix becomes available [1]. If updating is not possible, requesting assistance from a hosting provider or web developer is recommended. The vulnerability is actively monitored and cataloged by Patchstack.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <= 1.0.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.