VYPR
High severity7.1NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-69392

CVE-2025-69392

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in itex iMoney imoney allows Reflected XSS.This issue affects iMoney: from n/a through <= 0.36.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in the WordPress iMoney plugin (≤0.36) allows unauthenticated attackers to inject malicious scripts via improperly neutralized user input.

Vulnerability

Overview

The iMoney plugin for WordPress, in versions 0.36 and earlier, contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user input during web page generation. This flaw arises when the plugin fails to sanitize or escape data before including it in output, allowing an attacker to inject arbitrary HTML and JavaScript code [1].

Exploitation

Conditions

Attackers can exploit this vulnerability by crafting a malicious URL that, when clicked by a privileged user (such as an administrator), executes the injected script in the context of the victim's browser session. No authentication is required to craft the attack, but user interaction is necessary—the victim must visit the specially crafted link or submit a form [1]. This makes the vulnerability suitable for mass phishing campaigns targeting WordPress site administrators.

Impact

Successful exploitation allows an attacker to perform actions that the victim can, including redirecting visitors to malicious sites, injecting advertisements, or stealing session cookies and other sensitive data. The CVSS v3 base score is 7.1 (High), reflecting the potential for significant impact on the confidentiality, integrity, and availability of the affected site [1].

Mitigation

As of the publication date, no official patch has been released for the iMoney plugin. The vendor has not responded to the disclosure. Users are advised to immediately update the plugin if a patch becomes available, or to implement a Web Application Firewall (WAF) rule—such as the one provided by Patchstack—to block exploitation attempts until a fix can be applied [1]. Given that this vulnerability is expected to be used in mass-exploit campaigns, immediate action is strongly recommended.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.