Saleswonder Team Tobias WP2LEADS CVE-2025-49316

| EUVD-2025-28294 HIGH
Cross-site Scripting (XSS) (CWE-79)
2025-06-17 [email protected]
7.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-28294
CVE Published
Jun 17, 2025 - 15:15 nvd
HIGH 7.1

DescriptionNVD

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saleswonder Team Tobias WP2LEADS allows Reflected XSS. This issue affects WP2LEADS: from n/a through 3.5.0.

AnalysisAI

Reflected Cross-Site Scripting (XSS) vulnerability in the Saleswonder Team Tobias WP2LEADS WordPress plugin (versions up to 3.5.0) that allows unauthenticated attackers to inject malicious scripts into web pages viewed by users. An attacker can craft a malicious URL containing JavaScript payload and trick users into clicking it, potentially leading to session hijacking, credential theft, or malware distribution. The vulnerability has a CVSS score of 7.1 (High) with network-based attack vector requiring user interaction, and while KEV/active exploitation status and POC availability are not explicitly confirmed in provided data, the low attack complexity and reflected nature suggest moderate real-world risk.

Technical ContextAI

This vulnerability exploits improper input validation in WP2LEADS, a WordPress plugin developed by Saleswonder Team Tobias, failing to properly neutralize user-supplied input before reflecting it back in HTTP responses (CWE-79: Improper Neutralization of Input During Web Page Generation). The plugin likely accepts user parameters via URL query strings or POST data without sanitization/escaping, allowing attackers to embed arbitrary JavaScript that executes in victims' browsers within the context of the WordPress application. The reflected XSS classification indicates the malicious payload must be delivered via crafted URLs rather than being permanently stored, limiting blast radius but increasing social engineering feasibility. Affected versions span from an unspecified baseline through version 3.5.0, suggesting the vulnerability existed for multiple release cycles.

RemediationAI

Immediate mitigation: upgrade WP2LEADS to the first patched version after 3.5.0 (version number not provided in available data—check Saleswonder/plugin repository for latest release). If upgrade unavailable, temporary workarounds: (1) disable WP2LEADS plugin until patched version released; (2) implement WAF rules blocking common XSS payloads in plugin request parameters; (3) enforce Content-Security-Policy headers restricting script execution; (4) restrict plugin access via IP allowlisting if limited to specific users. Monitor Saleswonder Team Tobias official channels and WordPress plugin security advisories for patch availability. Review WordPress audit logs for evidence of exploitation attempts (suspicious URL parameters with script tags/JavaScript encoding).

Share

CVE-2025-49316 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy