Description
The URLYar URL Shortner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'urlyar_shortlink' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-10-15
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The URLYar URL Shortener plugin for WordPress contains a stored cross‑site scripting flaw that arises from inadequate sanitization and escaping of the attributes supplied to its "urlyar_shortlink" shortcode. Because of this, authenticated users with contributor or higher roles can embed malicious JavaScript into posts or pages that the plugin renders. When other visitors load the affected page, the injected script will execute in their browsers, allowing the attacker to steal session cookies, deface content, or perform further attacks. The vulnerability is limited to users who have contributor privileges and does not allow unauthenticated access. The impact is one of data theft and possible defacement within the compromised site.

Affected Systems

All versions of the URLYar WordPress plugin up to and including 1.1.0 are affected. The plugin is packaged by salamzadeh under the product name URLYar URL Shortener and is used in WordPress installations that include the "urlyar_shortlink" shortcode.

Risk and Exploitability

The CVSS score of 6.4 indicates a medium level of severity, and the EPSS score of less than 1% suggests the likelihood of exploitation is currently very low. The vulnerability is not listed in CISA’s KEV catalog. Attackers must be authenticated with contributor or higher privileges to inject the payload. Once a page containing the injected script is accessed by any visitor, the malicious code runs in the context of that user’s browser, potentially compromising their data or session. Because the flaw is stored, it persists until the content is modified or the plugin is updated.

Generated by OpenCVE AI on April 22, 2026 at 13:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the URLYar plugin to the latest available version (≥ 1.2.0), which removes the vulnerability by properly sanitizing shortcode attributes.
  • If an upgrade is not possible, deactivate or uninstall the URLYar plugin to eliminate the risk of stored cross‑site scripting.
  • As a temporary measure, limit the use of the "urlyar_shortlink" shortcode to administrator accounts only, restricting contributors from creating pages that store malicious scripts.

Generated by OpenCVE AI on April 22, 2026 at 13:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The URLYar URL Shortner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'urlyar_shortlink' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title URLYar <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:52:32.950Z

Reserved: 2025-09-08T20:02:18.215Z

Link: CVE-2025-10133

cve-icon Vulnrichment

Updated: 2025-10-15T14:44:03.701Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T09:15:37.500

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10133

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:15:17Z

Weaknesses