Description
The Mixlr Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'mixlr' shortcode in all versions up to, and including, 1.0.1. This is due to insufficient input sanitization and output escaping on the 'url' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-10-22
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting with contributor‑level access
Action: Apply Patch
AI Analysis

Impact

The Mixlr Shortcode plugin contains an insufficiently sanitized ‘url’ attribute within the ‘mixlr’ shortcode. The flaw allows an authenticated user with contributor or higher privileges to store malicious script code that will be executed in any user’s browser when the affected page is viewed. This is a classic reflected input error (CWE‑79) leading to stored XSS, potentially enabling credential theft or session hijacking for arbitrary users who view injected content. The impact is confined to situations where the malicious content is served to other site visitors; it does not grant full system compromise but can seriously undermine confidentiality and integrity of user sessions.

Affected Systems

Any WordPress installation using Mixlr Shortcode version 1.0.1 or earlier. The plugin is identified as mrgeorgegray:Mixlr Shortcode. No other products or versions are listed as affected.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS score is below 1%, suggesting a low probability of public exploitation at present, but the vulnerability remains actively exploitable by any contributor‑level user. As the flaw is not listed in CISA’s KEV catalog, there is no current evidence of widespread exploitation, yet an attacker who can inject content can compromise downstream users whenever the injected page is accessed. The likely attack vector requires prior authenticated access with at least contributor permissions to create or edit content containing the harmful shortcode.

Generated by OpenCVE AI on April 22, 2026 at 21:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mixlr Shortcode to the latest version that addresses the stored XSS flaw, ensuring the ‘url’ attribute is properly escaped.
  • Review all existing posts, pages and custom post types for the ‘mixlr’ shortcode and remove any that contain untrusted URLs or JavaScript code.
  • Restrict the use of the ‘mixlr’ shortcode to administrators or implement a role‑based filter to prevent contributors and below from inserting or editing content that includes the shortcode.

Generated by OpenCVE AI on April 22, 2026 at 21:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Mixlr Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'mixlr' shortcode in all versions up to, and including, 1.0.1. This is due to insufficient input sanitization and output escaping on the 'url' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Mixlr Shortcode <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:42:54.999Z

Reserved: 2025-10-15T15:12:29.079Z

Link: CVE-2025-11807

cve-icon Vulnrichment

Updated: 2025-10-22T15:15:31.864Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T09:15:32.490

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11807

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:00:18Z

Weaknesses