Description
The AudioTube plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'caption' shortcode attribute of the 'audiotube' shortcode in all versions up to, and including, 0.0.3. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The AudioTube WordPress plugin is affected by a stored cross‑site scripting flaw that originates from the "caption" attribute of the "audiotube" shortcode. Authenticated users with contributor or higher privileges can inject arbitrary JavaScript into the attribute, which is then executed in the browsers of any visitor to the affected page. This can lead to defacement, credential theft, session hijacking, or redirecting users to malicious sites, thereby compromising the confidentiality, integrity, and user experience of the site.

Affected Systems

All installations of the AudioTube plugin from davidangel, version 0.0.3 or earlier, used on any WordPress site that grants contributor or higher access to users. Sites running these plugin versions and allowing contributors to edit content are directly impacted.

Risk and Exploitability

The CVSS score of 6.4 reflects moderate severity. EPSS is reported as < 1%, indicating that the real‑world exploitation probability is currently low and the vulnerability is not listed in CISA’s KEV catalog. The attack vector requires an authenticated contributor or higher and the attacker must edit or create a post that contains the vulnerable shortcode. Once the payload is stored, any site visitor will trigger the malicious script when loading the page. The risk is mitigated only by applying a patch or disabling the vulnerable functionality.

Generated by OpenCVE AI on April 22, 2026 at 21:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AudioTube to the latest release that removes the vulnerability.
  • If an immediate update is not possible, intercept the "caption" attribute in the plugin and either remove it or apply strict server‑side sanitization before rendering the shortcode.
  • Review all existing posts that use the Audiotube shortcode and clean any malicious content from the caption attribute before publishing further changes.

Generated by OpenCVE AI on April 22, 2026 at 21:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The AudioTube plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'caption' shortcode attribute of the 'audiotube' shortcode in all versions up to, and including, 0.0.3. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title AudioTube <= 0.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:42:26.706Z

Reserved: 2025-10-15T14:29:58.910Z

Link: CVE-2025-11801

cve-icon Vulnrichment

Updated: 2025-11-21T14:53:52.486Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T08:15:51.267

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11801

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:15:27Z

Weaknesses