Description
The WP to LinkedIn Auto Publish plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via PostMessage in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-12-13
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client-side script execution (XSS)
Action: Update Plugin
AI Analysis

Impact

The WP to LinkedIn Auto Publish WordPress plugin contains a reflected cross‑site scripting vulnerability caused by insufficient input sanitization and output escaping in a PostMessage handler. An unauthenticated attacker can supply a crafted link that, when a user clicks it, injects arbitrary JavaScript into the page the user views. The injected script runs inside the victim’s browser session, allowing the attacker to steal cookies, hijack the user’s session, or perform other malicious actions on the website without the need for credentials.

Affected Systems

The vulnerability exists in all releases of the WP to LinkedIn Auto Publish plugin up to and including version 1.9.8. Any WordPress site that has installed this plugin and has not upgraded beyond 1.9.8 is potentially impacted. No specific WordPress core versions are cited as affected; the issue resides solely within the plugin code.

Risk and Exploitability

With a CVSS score of 6.1, the risk is moderate. The EPSS score of less than 1% indicates that the probability of active exploitation is low at present, and the vulnerability is not currently listed in the CISA KEV catalog. Because exploitation requires the victim to interact with a malicious link, the attack vector is user‑initiated; an attacker would need to compel the user to click, for example, through phishing or social engineering. Nevertheless, the potential impact on user sessions warrants timely remediation.

Generated by OpenCVE AI on April 21, 2026 at 00:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP to LinkedIn Auto Publish plugin to a version newer than 1.9.8 if one is available.
  • If no update is available, disable or uninstall the plugin until a patch is released.
  • Implement a site‑wide content security policy that restricts inline script execution and restricts script sources to trusted domains to mitigate the impact of any remaining reflected XSS attacks.

Generated by OpenCVE AI on April 21, 2026 at 00:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared F1logic
F1logic wp To Linkedin Auto Publish
Wordpress
Wordpress wordpress
Vendors & Products F1logic
F1logic wp To Linkedin Auto Publish
Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The WP to LinkedIn Auto Publish plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via PostMessage in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title WP to LinkedIn Auto Publish <= 1.9.8 - Reflected Cross-Site Scripting via PostMessage
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

F1logic Wp To Linkedin Auto Publish
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:26.473Z

Reserved: 2025-10-22T15:08:56.774Z

Link: CVE-2025-12077

cve-icon Vulnrichment

Updated: 2025-12-15T15:43:12.247Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:46.063

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12077

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:00:12Z

Weaknesses