CVE-2025-67912

MEDIUM
2025-12-16 [email protected]
6.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 17:44 vuln.today
CVE Published
Dec 16, 2025 - 09:15 nvd
MEDIUM 6.5

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Premio Stars Testimonials stars-testimonials-with-slider-and-masonry-grid allows Stored XSS.This issue affects Stars Testimonials: from n/a through <= 3.3.4.

Analysis

Stored cross-site scripting (XSS) in Premio Stars Testimonials WordPress plugin versions 3.3.4 and below allows authenticated users to inject malicious scripts that execute in the context of other users' browsers, potentially compromising site administrators or visitors. The vulnerability requires user interaction (UI:R) and authenticated access (PR:L), limiting immediate risk, but the stored nature means injected payloads persist and affect multiple users. No public exploit code or active KEV status is documented, though the 6.5 CVSS score reflects moderate severity when considering cross-site impact.

Technical Context

The vulnerability stems from improper input validation and output encoding in the Stars Testimonials plugin's testimonial submission or management functionality (CWE-79: Improper Neutralization of Input During Web Page Generation). The plugin fails to sanitize user-supplied input before storing it in the database and rendering it on web pages, allowing attackers to embed arbitrary JavaScript code. This is a classic stored XSS flaw affecting WordPress plugins that process user-generated content without adequate escaping. The CPE context indicates this affects the WordPress plugin ecosystem specifically, where authenticated users (typically those with Contributor, Author, or Editor roles) can create or modify testimonial entries that may not be properly filtered before display to higher-privileged users or the public.

Affected Products

Premio Stars Testimonials plugin (stars-testimonials-with-slider-and-masonry-grid) for WordPress versions up to and including 3.3.4 are affected. The vulnerability was reported by Patchstack's security audit team against the specific plugin distribution. Patched versions beyond 3.3.4 are presumed safe, though the exact patched version number is not stated in the available advisory reference at patchstack.com/database/Wordpress/Plugin/stars-testimonials-with-slider-and-masonry-grid/.

Remediation

Users should immediately update the Stars Testimonials plugin to a version newer than 3.3.4, available from the WordPress plugin repository or the vendor's site linked via Patchstack. Site administrators should review the plugin's update changelog to identify the first version released after 3.3.4 that patches this XSS flaw. As a temporary workaround pending patching, restrict plugin access to trusted administrators only via WordPress user role management; additionally, configure web application firewalls or security plugins to filter suspicious script tags in form submissions. The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/stars-testimonials-with-slider-and-masonry-grid/vulnerability/wordpress-stars-testimonials-plugin-3-3-4-cross-site-scripting-xss-vulnerability) contains detailed patching guidance and may specify the exact fixed version.

Priority Score

33
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: 0

Share

CVE-2025-67912 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy