VYPR
Medium severity6.4NVD Advisory· Published Dec 13, 2025· Updated Apr 15, 2026

CVE-2025-8687

CVE-2025-8687

Description

The Enter Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown and Image Comparison widgets in all versions up to, and including, 2.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Enter Addons WordPress plugin via Countdown and Image Comparison widgets allows contributor-level users to inject arbitrary scripts.

Vulnerability

Overview

The Enter Addons plugin for WordPress, up to version 2.2.7, contains a Stored Cross-Site Scripting (XSS) vulnerability in its Countdown and Image Comparison widgets. The root cause is insufficient input sanitization and output escaping on user-supplied attributes within these widgets. This allows authenticated attackers to inject arbitrary web scripts that are stored on the server and executed when a page is created or updated [1].

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must have at least contributor-level access to the WordPress site. The attacker can then craft a page or post using the vulnerable widgets, embedding malicious JavaScript in the widget attributes. When any user (including administrators or visitors) accesses the affected page, the injected script executes in their browser context [1].

Impact

Successful exploitation leads to Stored XSS, enabling the attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, defacing the page, or performing other actions within the security context of the victim's browser. Because the script is stored, it persists across visits and can affect multiple users without requiring further interaction from the attacker [1].

Mitigation

The vendor has not released a patched version as of the publication date. Users are advised to restrict contributor-level access to trusted individuals only, or to disable the vulnerable widgets until an alternative. The plugin is listed on the WordPress plugin repository, and updates may be provided in future versions [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.