CVE-2025-67912
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
2Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Premio Stars Testimonials stars-testimonials-with-slider-and-masonry-grid allows Stored XSS.This issue affects Stars Testimonials: from n/a through <= 3.3.4.
Analysis
Stored cross-site scripting (XSS) in Premio Stars Testimonials WordPress plugin versions 3.3.4 and below allows authenticated users to inject malicious scripts that execute in the context of other users' browsers, potentially compromising site administrators or visitors. The vulnerability requires user interaction (UI:R) and authenticated access (PR:L), limiting immediate risk, but the stored nature means injected payloads persist and affect multiple users. No public exploit code or active KEV status is documented, though the 6.5 CVSS score reflects moderate severity when considering cross-site impact.
Technical Context
The vulnerability stems from improper input validation and output encoding in the Stars Testimonials plugin's testimonial submission or management functionality (CWE-79: Improper Neutralization of Input During Web Page Generation). The plugin fails to sanitize user-supplied input before storing it in the database and rendering it on web pages, allowing attackers to embed arbitrary JavaScript code. This is a classic stored XSS flaw affecting WordPress plugins that process user-generated content without adequate escaping. The CPE context indicates this affects the WordPress plugin ecosystem specifically, where authenticated users (typically those with Contributor, Author, or Editor roles) can create or modify testimonial entries that may not be properly filtered before display to higher-privileged users or the public.
Affected Products
Premio Stars Testimonials plugin (stars-testimonials-with-slider-and-masonry-grid) for WordPress versions up to and including 3.3.4 are affected. The vulnerability was reported by Patchstack's security audit team against the specific plugin distribution. Patched versions beyond 3.3.4 are presumed safe, though the exact patched version number is not stated in the available advisory reference at patchstack.com/database/Wordpress/Plugin/stars-testimonials-with-slider-and-masonry-grid/.
Remediation
Users should immediately update the Stars Testimonials plugin to a version newer than 3.3.4, available from the WordPress plugin repository or the vendor's site linked via Patchstack. Site administrators should review the plugin's update changelog to identify the first version released after 3.3.4 that patches this XSS flaw. As a temporary workaround pending patching, restrict plugin access to trusted administrators only via WordPress user role management; additionally, configure web application firewalls or security plugins to filter suspicious script tags in form submissions. The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/stars-testimonials-with-slider-and-masonry-grid/vulnerability/wordpress-stars-testimonials-plugin-3-3-4-cross-site-scripting-xss-vulnerability) contains detailed patching guidance and may specify the exact fixed version.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today