VYPR
High severity7.1NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-69389

CVE-2025-69389

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hugh Mungus Visitor Maps Extended Referer Field visitor-maps-extended-referer-field allows Reflected XSS.This issue affects Visitor Maps Extended Referer Field: from n/a through <= 1.2.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in WordPress Visitor Maps Extended Referer Field plugin allows script injection via referer field; update to mitigate.

Vulnerability

Overview

CVE-2025-69389 is a reflected cross-site scripting (XSS) vulnerability in the Visitor Maps Extended Referer Field WordPress plugin, affecting versions n/a through 1.2.6. The issue stems from improper neutralization of user-supplied input during web page generation, specifically within the referer field, allowing attackers to inject arbitrary HTML and JavaScript [1].

Exploitation

To exploit this vulnerability, an attacker must trick a privileged user (such as a site administrator) into clicking a crafted link or visiting a maliciously prepared page. No special network position is required, making it accessible for remote exploitation. The injected script executes in the context of the victim's browser when they interact with the compromised referer field [1].

Impact

Successful exploitation enables a malicious actor to inject scripts that could perform actions such as redirecting visitors to malicious sites, displaying advertisements, or stealing sensitive data. The CVSS v3 base score is 7.1 (High), and the vulnerability is expected to be used in mass-exploit campaigns targeting thousands of websites [1].

Mitigation

The plugin developer has not yet released an official patch, but Patchstack provides a mitigation rule to block attacks until a fix is applied. Users are strongly advised to update the plugin immediately when a patched version becomes available. If updating is not possible, consulting a hosting provider or web developer is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.