Description
The Lightweight Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `lightweight-accordion` shortcode in all versions up to, and including, 1.5.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-15
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Lightweight Accordion plugin suffers from a stored cross‑site scripting flaw that allows authenticated contributors or higher to embed arbitrary scripts via the plugin’s shortcode attributes. The plugin accepts user supplied attributes without proper sanitization or escaping, meaning malicious code can be persisted in the database and executed whenever a page containing the shortcode is rendered. This can lead to the theft of session cookies, credential compromise, and defacement or hijacking of the site for anyone who views the affected page.

Affected Systems

WordPress sites that include the Lightweight Accordion plugin version 1.5.20 or earlier, distributed by the vendor someguy9. All installations of the plugin before the identified fixed version are vulnerable.

Risk and Exploitability

With a CVSS score of 6.4 the flaw is considered moderate in severity, and its EPSS score is below 1 %, indicating a very low probability of widespread exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to possess contributor‑level or higher access to insert the malicious shortcode. Once the content is stored, any user who views the affected page will have the injected script executed in their browser, making the risk primarily a cross‑site scripting threat to other site visitors rather than an arbitrary‑code execution vector.

Generated by OpenCVE AI on April 21, 2026 at 17:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Lightweight Accordion plugin to the latest vendor‑released version, which includes the fix for the CWE‑79 stored XSS vulnerability.
  • If an immediate update is not feasible, disable or uninstall the plugin to eliminate the vulnerability.
  • Limit content editing privileges for contributor or higher roles, or enforce site‑wide access controls to prevent insertion of malicious shortcodes.

Generated by OpenCVE AI on April 21, 2026 at 17:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 15 Dec 2025 04:00:00 +0000

Type Values Removed Values Added
Description The Lightweight Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `lightweight-accordion` shortcode in all versions up to, and including, 1.5.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Lightweight Accordion <= 1.5.20 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:22.232Z

Reserved: 2025-11-26T13:03:03.787Z

Link: CVE-2025-13740

cve-icon Vulnrichment

Updated: 2025-12-15T15:42:39.360Z

cve-icon NVD

Status : Deferred

Published: 2025-12-15T04:15:36.577

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:15:25Z

Weaknesses