Description
The MailerLite – Signup forms (official) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'form_description' and 'success_message' parameters in versions up to, and including, 1.7.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The MailerLite – Signup forms (official) plugin for WordPress contains a stored cross‑site scripting flaw that allows inject arbitrary JavaScript via the form_description and success_message parameters in plugin versions up to 1.7.16. Input filtering is insufficient and output escaping is omitted, which enables an attacker to embed a payload that is executed whenever anyone views a page that includes the stored data. This can lead to credential theft, session hijacking, site defacement, or the execution of malicious scripts on all visitor browsers. The vulnerability is classified as CWE‑79.

Affected Systems

WordPress sites running the MailerLite – Signup forms (official) plugin, versions 1.7.16 and earlier, are affected. The flaw requires that the attacker has authenticated administrator‑level or higher access to submit the malicious form fields.

Risk and Exploitability

The CVSS score of 5.5 indicates a medium impact profile, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at this time. The flaw is not currently listed in the CISA KEV catalog, but attackers can exploit it once they acquire administrator credentials, after which the malicious script runs in the context of any site visitor. The attack vector is inferred to be via the plugin’s backend forms which are only accessible to authenticated administrators. Mitigation requires the removal of the vulnerability through an update or a workaround that properly sanitizes or escapes the stored content.

Generated by OpenCVE AI on April 21, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MailerLite – Signup forms (official) plugin to a version newer than 1.7.16 that addresses the scripting issue.
  • Limit administrator access so that only trusted personnel can modify form settings and remove unused administrator accounts.
  • If upgrading is not immediately possible, sanitize or escape the form_description and success_message values before they are rendered, for example by using esc_html() or wp_kses().

Generated by OpenCVE AI on April 21, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Mailerlite
Mailerlite mailerlite
Mailerlite mailerlite Signup Forms
Wordpress
Wordpress wordpress
Vendors & Products Mailerlite
Mailerlite mailerlite
Mailerlite mailerlite Signup Forms
Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 09:45:00 +0000

Type Values Removed Values Added
Description The MailerLite – Signup forms (official) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'form_description' and 'success_message' parameters in versions up to, and including, 1.7.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title MailerLite – Signup forms (official) <= 1.7.16 - Authenticated (Administrator+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Mailerlite Mailerlite Mailerlite Signup Forms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:57.062Z

Reserved: 2025-12-03T18:41:30.824Z

Link: CVE-2025-13993

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-12-12T10:15:48.540

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13993

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:30:37Z

Weaknesses