VYPR
Medium severity6.4NVD Advisory· Published Sep 11, 2025· Updated Apr 15, 2026

CVE-2025-8316

CVE-2025-8316

Description

The Certifica WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘evento’ parameter in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Certifica WP plugin up to v3.1 contains a Stored XSS vulnerability via the 'evento' parameter, allowing authenticated attackers to inject arbitrary scripts.

Vulnerability

Overview The Certifica WP plugin for WordPress is susceptible to Stored Cross-Site Scripting (XSS) through its 'evento' shortcode parameter. The plugin fails to properly sanitize user-supplied input or escape output when rendering the parameter in pages. In versions up to and including 3.1, the $event_key variable is derived from the evento attribute without sanitization, allowing malicious script payloads to be stored [1].

Exploitation

Details An attacker with at least Contributor-level access can inject arbitrary web scripts via the shortcode. The vulnerability is triggered when the plugin processes the evento attribute and subsequently outputs it without escaping. Although the code checks for user login and validates the event key against a hardcoded string ('ID_EVENTO'), no XSS sanitization is performed on the attribute itself [1]. The injected script executes in the context of any user visiting the affected page, including administrators.

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the browsers of visitors. This can lead to session hijacking, defacement, or theft of sensitive information. The CVSS v3 score of 6.4 (Medium) reflects the requirement for authenticated access but the potential for broad impact on site users.

Mitigation

As of the analysis, no patch has been released for versions up to 3.1. Administrators should restrict Contributor-level access where possible, audit pages for injected scripts, and consider disabling the plugin until an update is available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.