CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
The Get Use APIs WordPress plugin before 2.0.10 executes imported JSON, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks under certain server configurations.
Analysis
The Get Use APIs WordPress plugin before version 2.0.10 contains a Cross-Site Scripting (XSS) vulnerability that arises from unsanitized execution of imported JSON data. This vulnerability allows attackers with contributor-level privileges (a low-level WordPress role) to inject and execute malicious scripts under certain server configurations, potentially compromising site integrity and user data. A public proof-of-concept exploit is available via WPScan, and the vulnerability has been documented in multiple intelligence sources (WPScan, VulDB, and EUVD-2025-208813), indicating active awareness in the security community.
Technical Context
The vulnerability stems from improper handling of JSON input during the import functionality of the Get Use APIs plugin. The root cause is a failure to properly sanitize or validate JSON data before execution, which falls under the broader CWE category of improper input validation leading to code execution. The affected product, identified via CPE as cpe:2.3:a:unknown:get_use_apis:*:*:*:*:*:*:*:*, is a PHP-based WordPress plugin designed to provide API integration capabilities. The vulnerability exploits the fact that certain server configurations may allow direct execution of JSON content as code, particularly if the plugin uses functions like eval() or similar dynamic code execution patterns without proper escaping. This is exacerbated by the fact that even low-privileged users (contributors) can trigger the vulnerable import pathway.
Affected Products
The Get Use APIs WordPress plugin in all versions prior to 2.0.10 is affected, as confirmed by the CPE identifier cpe:2.3:a:unknown:get_use_apis:*:*:*:*:*:*:*:* and EUVD advisory listing versions 0 through 2.0.9 as vulnerable. The vulnerability impacts any WordPress installation running this plugin with an affected version. Administrators should consult the WPScan vulnerability database entry at https://wpscan.com/vulnerability/428d08bb-5329-4406-a785-131bae4ed085/ and the NIST NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-15363 for complete details.
Remediation
Immediately upgrade the Get Use APIs plugin to version 2.0.10 or later through the WordPress plugin administration panel or manually via the WordPress plugin repository. Until patching is possible, restrict contributor-level permissions to trusted users only and review existing contributor accounts for unauthorized access. Additionally, configure your WordPress site to disable JSON file imports from untrusted sources and implement Web Application Firewall (WAF) rules to detect and block XSS payloads in import requests. Monitor server logs for suspicious import activities referencing the plugin's import functionality. For comprehensive guidance, refer to the WPScan vulnerability advisory at https://wpscan.com/vulnerability/428d08bb-5329-4406-a785-131bae4ed085/.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-208813