Description
The Twitter Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ottwitter_feed' shortcode in all versions up to, and including, 1.3.1. This is due to the plugin not properly sanitizing user input and output of the 'width' and 'height' parameters. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-11
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting for users with Contributor level access
Action: Patch Now
AI Analysis

Impact

The Twitter Feed plugin for WordPress stores unfiltered data in the width and height shortcode parameters, enabling a contributor or higher to inject JavaScript that is executed when any visitor loads a page containing the affected shortcode. This stored Cross‑Site Scripting flaw allows arbitrary script execution, which can be used to deface content, steal session cookies, or redirect users, compromising the integrity and confidentiality of the site.

Affected Systems

The vulnerability affects the "Twitter Feed" plugin developed by caselock, in all versions up to and including 1.3.1. No other products or versions are listed as affected.

Risk and Exploitability

With a CVSS score of 6.4, the issue is considered moderate in severity. The EPSS score of less than 1% indicates that current exploitation attempts are very low, and the vulnerability is not listed in the CISA KEV catalog. Attackers must have contributor‑level or higher access to the WordPress site, after which the stored XSS payload can impact any visitor of a page that includes the impacted shortcode. Even though the attack vector requires authentication, the potential damage to the site’s user experience and data integrity warrants prompt attention.

Generated by OpenCVE AI on April 21, 2026 at 01:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Twitter Feed plugin to the latest available version (>=1.3.2) issued by caselock.
  • If an update is not immediately possible, disable or remove the ottwitter_feed shortcode from the site to eliminate the vector.
  • Restrict or review contributor‑level accounts, and consider requiring two‑factor authentication for all authenticated users to reduce the risk of malicious script injection.

Generated by OpenCVE AI on April 21, 2026 at 01:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 14 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Caselock
Caselock twitter Feed
Wordpress
Wordpress wordpress
Vendors & Products Caselock
Caselock twitter Feed
Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Twitter Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ottwitter_feed' shortcode in all versions up to, and including, 1.3.1. This is due to the plugin not properly sanitizing user input and output of the 'width' and 'height' parameters. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Twitter Feed <= 1.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Caselock Twitter Feed
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:24:20.040Z

Reserved: 2025-10-16T13:26:59.906Z

Link: CVE-2025-11860

cve-icon Vulnrichment

Updated: 2025-11-14T15:21:00.901Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T04:15:43.270

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11860

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:45:24Z

Weaknesses