CVE-2025-62967

MEDIUM
2025-10-27 [email protected]
6.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Oct 27, 2025 - 02:15 nvd
MEDIUM 6.5

DescriptionNVD

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Designinvento DirectoryPress directorypress allows DOM-Based XSS.This issue affects DirectoryPress: from n/a through <= 3.6.25.

AnalysisAI

DOM-based cross-site scripting (XSS) in Designinvento DirectoryPress WordPress plugin through version 3.6.25 allows authenticated attackers with low privileges to inject malicious scripts that execute in the context of other users' browsers when they view affected pages. The vulnerability requires user interaction (clicking a malicious link) and can affect website visitors across the entire site, potentially leading to session hijacking, credential theft, or malware distribution. EPSS score of 0.02% indicates low exploitation probability despite the publicly available vulnerability details.

Technical ContextAI

DirectoryPress is a WordPress directory listing plugin that processes user-supplied input for dynamic web page generation. The vulnerability stems from improper neutralization of input during DOM (Document Object Model) construction, classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). DOM-based XSS occurs when untrusted data reaches the DOM through methods like innerHTML, eval(), or direct attribute assignment without proper sanitization or encoding. Unlike reflected XSS, DOM-based variants execute entirely in the browser after the page loads, making them harder to detect with traditional network-based security controls. The plugin fails to properly escape or validate user input before it is used to manipulate the DOM, allowing attackers to break out of intended HTML context and inject arbitrary JavaScript.

Affected ProductsAI

Designinvento DirectoryPress WordPress plugin versions from an unspecified starting point through and including version 3.6.25 are affected. The plugin is distributed via WordPress.org plugin repository and identified in Patchstack's vulnerability database. Affected sites running DirectoryPress versions up to and including 3.6.25 require remediation; exact version ranges prior to 3.6.25 are not specified in available data.

RemediationAI

Update DirectoryPress to a patched version newer than 3.6.25 immediately. Check the official WordPress plugin repository or contact Designinvento for the latest available version. Ensure the updated version includes input sanitization and output encoding fixes for DOM-based XSS. As an interim measure, restrict plugin functionality to trusted administrative users only and disable public-facing directory features if the vulnerability is not yet patched. Refer to the Patchstack vulnerability advisory at https://patchstack.com/database/Wordpress/Plugin/directorypress/vulnerability/wordpress-directorypress-plugin-3-6-25-cross-site-scripting-xss-vulnerability for additional remediation guidance and patch availability confirmation.

Share

CVE-2025-62967 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy