VYPR
Medium severity6.5NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-69011

CVE-2025-69011

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPKube Cool Tag Cloud cool-tag-cloud allows Stored XSS.This issue affects Cool Tag Cloud: from n/a through <= 2.29.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in WPKube Cool Tag Cloud plugin allows attackers to inject malicious scripts, affecting versions up to 2.29.

Vulnerability

Overview The Cool Tag Cloud plugin by WPKube suffers from a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. This issue affects all versions from n/a through 2.29. The vulnerability allows attackers to inject arbitrary HTML and JavaScript payloads into the plugin's output, which are then stored and executed when users visit the affected page.

Attack

Vector and Prerequisites Exploitation requires a privileged user, such as an administrator, to perform an action that triggers the stored payload, for example, clicking a malicious link or visiting a crafted page. No direct authentication from the attacker is needed, but the attacker must have a way to inject the malicious input, typically through settings or fields that are later rendered [1]. The vulnerability is known to be used in mass-exploit campaigns targeting WordPress sites regardless of size.

Impact

If successfully exploited, an attacker can execute arbitrary scripts in the context of the victim's browser, leading to potential redirects, defacement, data theft, or further attacks on the website and its visitors. The CVSS v3 score is 6.5 (Medium), reflecting the need for user interaction and privileges [1].

Mitigation

The vendor has not released a patched version for CVE-2025-69011 at this time. Users are strongly advised to update the plugin immediately if a fix becomes available. As a workaround, consider disabling the plugin or applying virtual patching via a web application firewall. If unable to update, consult with your hosting provider or web developer for assistance [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.