Description
The Slippy Slider – Responsive Touch Navigation Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slippy-slider' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting for Contributors
Action: Apply Patch
AI Analysis

Impact

The Slippy Slider plugin for WordPress contains a stored cross‑site scripting flaw in its 'slippy-slider' shortcode. The plugin fails to sanitize or escape user‑supplied attributes, allowing an authenticated user with contributor or higher privileges to embed arbitrary JavaScript into the shortcode content. When a page containing the injected shortcode is loaded, the malicious script will run in the context of that page, potentially defacing content, stealing credentials, or performing other client‑side attacks. This weakness is classified as Web Input Validation/Cross‑Site Scripting (CWE‑80).

Affected Systems

This flaw affects the mitegvg Slippy Slider – Responsive Touch Navigation Slider plugin for WordPress in all releases up to and including version 2.0. Sites running any of these versions of the plugin are vulnerable if an authenticated contributor or higher role is present. No specific PHP or platform versions are listed in the advisory, so the issue applies to all WordPress environments hosting the affected plugin.

Risk and Exploitability

The CVSS base score of 5.4 indicates moderate severity, primarily due to the need for an authenticated user with contributor or higher privileges to inject payloads. The EPSS score is below 1%, suggesting the likelihood of public exploitation is low, and the vulnerability is not currently listed in the CISA KEV catalog. Nevertheless, the absence of sanitization means any user who authenticates with sufficient rights can inject scripts that will execute for all visitors who view the affected page. Because the vulnerability is stored, the malicious code persists until the plugin is upgraded or removed.

Generated by OpenCVE AI on April 27, 2026 at 22:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Slippy Slider plugin to the latest release that fixes the sanitization flaw.
  • If a newer version is unavailable, permanently delete the plugin from the site.
  • Manually edit or delete any posts, pages, or custom content that contains the vulnerable 'slippy-slider' shortcode to remove injected scripts.
  • Limit contributor and higher-level user accounts to trusted individuals, or revoke those roles until the vulnerability is patched.

Generated by OpenCVE AI on April 27, 2026 at 22:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 12 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Slippy Slider – Responsive Touch Navigation Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slippy-slider' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Slippy Slider – Responsive Touch Navigation Slider <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-80
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:41:29.381Z

Reserved: 2025-10-16T16:31:07.667Z

Link: CVE-2025-11874

cve-icon Vulnrichment

Updated: 2025-11-12T17:30:00.949Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T04:15:43.927

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11874

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:00:13Z

Weaknesses