CVE-2025-8686
Description
The WP Easy FAQs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's WP_EASY_FAQ shortcode in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in WP Easy FAQs plugin ≤1.0.5 via unsanitized shortcode attributes allows authors to inject arbitrary scripts.
The WP Easy FAQs plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to and including 1.0.5. The vulnerability resides in the WP_EASY_FAQ shortcode, where user-supplied attributes are not properly sanitized or escaped before being output. This lack of input validation and output escaping allows malicious HTML and JavaScript to be stored in the WordPress database [1][2].
An authenticated attacker with at least author-level access can exploit this by crafting a post or page containing the vulnerable shortcode with malicious attribute values. When any user—including administrators—visits the affected page, the injected script executes in their browser. No additional privileges or user interaction beyond viewing the page are required [1].
Successful exploitation enables arbitrary script execution in the victim's browser session. This can lead to session cookie theft, account takeover, website defacement, or redirection to malicious sites, compromising the confidentiality and integrity of the WordPress installation [2].
As of the publication date, no patched version has been released. Users are advised to disable the plugin or apply strict content controls until an update is available. The vulnerability has been assigned a CVSS v3 score of 6.4 (Medium) [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=1.0.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.svn.wordpress.org/wp-easy-faqs/tags/1.0.5/admin/class-wp-easy-faqs-admin.phpnvd
- plugins.svn.wordpress.org/wp-easy-faqs/tags/1.0.5/includes/class-wp-easy-faqs-shortcode.phpnvd
- wordpress.org/plugins/wp-easy-faqs/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/2d3c2f4b-389e-4dec-bb18-b63cfa053947nvd
News mentions
0No linked articles in our index yet.