Description
The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 13.2.4 due to insufficient input sanitization and output escaping on Google Reviews data imported by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute in the admin panel (and potentially on the frontend) whenever a user accesses imported reviews, granted they can add a malicious review to a Google Place that is connected to the vulnerable site.
Published: 2025-12-06
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting in admin and front‑end
Action: Patch
AI Analysis

Impact

The Widgets for Google Reviews plugin for WordPress is affected by a stored cross‑site scripting flaw caused by insufficient input sanitization and output escaping of imported Google Reviews data. An unauthenticated attacker who can add a malicious review to a Google Place linked to the vulnerable site can supply arbitrary JavaScript that is later rendered by the plugin in the admin panel and, potentially, on the public front‑end whenever a opens the imported review. The injected script runs with the privileges of the page context, enabling session hijacking, data theft, defacement, or further exploitation of the site.

Affected Systems

The vulnerability impacts the WordPress plugin Widgets for Google Reviews, any installation of which uses version 13.2.4 or earlier. All affected systems run this plugin on a WordPress site and have the plugin configured to import reviews from Google Places.

Risk and Exploitability

The CVSS score of 7.2 reflects a high severity, while the EPSS score of less than 1% indicates a low exploitation probability at present. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker can exploit the weakness without authentication by creating a malicious review on a connected Google Place; the script is stored by the plugin and executed whenever the review is displayed, potentially affecting any visitor or administrator who views the review. Because the remediation is a simple update, the risk decreases once the patch is applied, but until then the ability to run arbitrary client‑side code remains.

Generated by OpenCVE AI on April 21, 2026 at 17:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Widgets for Google Reviews plugin to a version newer than 13.2.4, which removes the stored XSS vulnerability.
  • If an upgrade cannot be performed immediately, consider disabling the plugin or removing the Google Place integration until a patched version is available.
  • In the meantime, enforce output escaping on review content by using the WordPress sanitization functions such as wp_kses and ensure that any imported review data is encoded before rendering in both the admin area and public pages.

Generated by OpenCVE AI on April 21, 2026 at 17:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Trustindex
Trustindex widgets For Google Reviews
Wordpress
Wordpress wordpress
Vendors & Products Trustindex
Trustindex widgets For Google Reviews
Wordpress
Wordpress wordpress

Mon, 08 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 06 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 13.2.4 due to insufficient input sanitization and output escaping on Google Reviews data imported by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute in the admin panel (and potentially on the frontend) whenever a user accesses imported reviews, granted they can add a malicious review to a Google Place that is connected to the vulnerable site.
Title Widgets for Google Reviews <= 13.2.4 - Unauthenticated Stored Cross-Site Scripting via Google Reviews
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Trustindex Widgets For Google Reviews
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:25.180Z

Reserved: 2025-10-30T14:13:05.206Z

Link: CVE-2025-12510

cve-icon Vulnrichment

Updated: 2025-12-08T20:49:21.367Z

cve-icon NVD

Status : Deferred

Published: 2025-12-06T04:15:47.183

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:45:16Z

Weaknesses