VYPR
Low severity3.5NVD Advisory· Published Jan 5, 2026· Updated Apr 15, 2026

CVE-2025-9543

CVE-2025-9543

Description

The FlexTable WordPress plugin before 3.19.2 does not sanitise and escape the imported links from Google Sheet cells, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

FlexTable plugin before 3.19.2 fails to sanitize imported Google Sheet links, enabling stored XSS for high-privilege users even when unfiltered_html is disallowed.

Vulnerability

Overview The FlexTable Google Sheets Connector plugin for WordPress, in versions prior to 3.19.2.2, fails to sanitize and escape imported links from Google Sheet cells. This vulnerability stems from insufficient input handling when the plugin processes external spreadsheet data, allowing malicious link content to be stored and later rendered in the context of an administrator's session. The issue is particularly critical because it can be exploited even in environments where the unfiltered_html capability is disallowed (e.g., multisite setups), bypassing a common security control.

Exploitation and

Attack Surface A high-privilege user, such as an administrator, can import a specially craft a Google Sheet containing a malicious link in a cell. When the plugin imports and displays this link without proper output encoding, it executes arbitrary JavaScript within the administrative interface. The attack requires the attacker to have at least administrator-level access to the WordPress site, which typically involves already sensitive accounts. However, the stored XSS can then affect other administrators or contributors who view the affected table, potentially leading to further compromise [1].

Impact

Successful exploitation allows an attacker to inject arbitrary JavaScript into the admin dashboard. This can lead to session hijacking, forced administrative actions, or defacement, all while bypassing the unfiltered_html restriction that normally prevents such attacks. The CVSS v3.5 CVSS score reflects the limited attack surface (high privileges required) and the need for user interaction (viewing the malicious link).

Mitigation

The vulnerability has been addressed in version 3.19.2 of the FlexTable plugin [1]. Users are strongly advised to update to this patched release or later. There are no known workarounds beyond upgrading. The vulnerability was publicly disclosed on 2025-12-15 and is not currently known to be exploited in the wild.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.