VYPR
Medium severity6.4NVD Advisory· Published Sep 30, 2025· Updated Apr 15, 2026

CVE-2025-8777

CVE-2025-8777

Description

The planetcalc plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘language’ parameter in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The planetcalc WordPress plugin ≤2.2 has a stored XSS vulnerability via the 'language' parameter, allowing Contributor+ users to inject arbitrary scripts.

The planetcalc plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to and including 2.2. The vulnerability exists in the planetcalc_embed function, where the 'language' parameter is used without sufficient input sanitization or output escaping [1]. This allows an attacker to inject arbitrary web scripts that are stored on the server and executed when a user accesses the affected page.

To exploit this vulnerability, an attacker must have at least Contributor-level access to the WordPress site. The attacker can supply a malicious payload through the 'language' parameter in the shortcode. When the shortcode is rendered, the unsanitized input is output directly, leading to script execution in the context of the victim's browser [1].

The impact of successful exploitation includes the ability to execute arbitrary JavaScript in the browsers of users visiting the compromised page. This can lead to session hijacking, defacement, or redirection to malicious sites. The CVSS v3 score of 6.4 (Medium) reflects the need for authenticated access but the potential for significant harm [CVE description].

As of September 26, 2025, the plugin has been closed and is no longer available for download from the WordPress plugin repository due to this security issue [2]. Users are advised to remove the plugin from their sites and replace it with an alternative solution, as no patched version exists.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.