Description
The VigLink SpotLight By ShortCode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'float' parameter of the 'spotlight' shortcode in all versions up to, and including, 1.0.a due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-12
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the VigLink SpotLight By ShortCode plugin for WordPress, where the 'float' attribute of the 'spotlight' shortcode is not properly sanitized or escaped. As a result, an attacker who can authenticate to the WordPress site with at least Contributor privileges can inject arbitrary JavaScript into content that is stored and later rendered. The injected code executes in the browser of any visitor who views the affected page, enabling defacement, credential theft, or further session hijacking. The weakness is a classic input validation flaw classified as CWE‑79. The impact is direct compromise of confidentiality and integrity of the website’s content, while the availability of the site is unlikely to be affected.

Affected Systems

This flaw affects the VigLink SpotLight By ShortCode WordPress plugin, version 1.0.a and all earlier releases. The plugin is distributed under the name VigLink SpotLight By ShortCode and can be present on any WordPress installation that has installed or upgraded to these versions. No specific distribution channel beyond the WordPress Plugin Repository is mentioned, so any site that has the plugin enabled could be vulnerable.

Risk and Exploitability

The CVSS score of 6.4 reflects a medium severity vulnerability that requires authenticated access to exploit. The EPSS score of less than 1% indicates a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack path is via a contributor-level user submitting a malicious shortcode value; no privilege escalation or remote code execution is required beyond authenticated use. Because the flaw is based on stored XSS, successful exploitation leads to code execution in the context of site visitors, which can have serious consequences if the site is targeted by a malicious attacker.

Generated by OpenCVE AI on April 21, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the VigLink SpotLight By ShortCode plugin to the latest release that removes the vulnerable 'float' handling or uninstall the plugin if an update is unavailable.
  • Remove or sanitize the 'float' attribute from all existing shortcodes in post content, or replace it with a safe value, and review stored content for malicious code.
  • Restrict contributor and higher roles so they cannot insert or edit unfiltered shortcodes; enable built‑in WordPress role filters or disable the 'do_shortcode' function for untrusted users.

Generated by OpenCVE AI on April 21, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The VigLink SpotLight By ShortCode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'float' parameter of the 'spotlight' shortcode in all versions up to, and including, 1.0.a due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title VigLink SpotLight By ShortCode <= 1.0.a - Authenticated (Contributor+) Stored Cross-Site Scripting via 'float' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:23.218Z

Reserved: 2025-12-01T19:08:04.053Z

Link: CVE-2025-13843

cve-icon Vulnrichment

Updated: 2025-12-12T19:49:34.324Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T04:15:42.487

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13843

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:30:37Z

Weaknesses