VYPR
Medium severity6.4NVD Advisory· Published Sep 17, 2025· Updated Apr 15, 2026

CVE-2025-8394

CVE-2025-8394

Description

The Productive Style plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_productive_breadcrumb shortcode in all versions up to, and including, 1.1.23 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Productive Style WordPress plugin via shortcode attribute, allowing contributor-level attackers to inject scripts.

The Productive Style plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to 1.1.23. The vulnerability exists in the display_productive_breadcrumb shortcode, which fails to properly sanitize user-supplied attributes and escape output before rendering. This allows attackers to inject arbitrary web scripts that are stored and executed when other users access the affected page [1].

The attack requires authenticated access with at least contributor-level permissions. The shortcode is part of the plugin's breadcrumb functionality, and by crafting malicious attributes, an attacker can inject persistent JavaScript code. The vulnerability is due to insufficient input validation and output escaping in the shortcode handling, as seen in the plugin's code [2].

Successful exploitation allows the attacker to perform actions in the context of the victim user, such as stealing cookies, session tokens, or performing actions on behalf of the victim. This can lead to privilege escalation or defacement of the WordPress site. The stored nature of the XSS means that any user visiting the compromised page is affected.

The vulnerability has been patched in versions after 1.1.23. Users are strongly advised to update to the latest version of the plugin. No official workaround is available; updating is the recommended mitigation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.