Description
The Custom Post Type UI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'label' parameter during custom post type import in all versions up to, and including, 1.18.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the Tools → Get Code page.
Published: 2025-12-13
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The Custom Post Type UI plugin for WordPress is vulnerable to stored cross‑site scripting through the "label" parameter used during custom post type import. Because the plugin does not sanitize or escape this input, an authenticated user with Administrator privileges can inject arbitrary JavaScript that will be executed whenever a site visitor opens the Tools → Get Code page. This flaw allows an attacker to run client‑side code in the victim’s browser, potentially leading to credential compromise, defacement, or further malicious activity.

Affected Systems

The vulnerability affects all releases of the Custom Post Type UI WordPress plugin up to and including version 1.18.1. Any WordPress installation employing this plugin without a later patch is at risk.

Risk and Exploitability

The CVSS score of 4.4 indicates moderate severity, and the EPSS score of less than 1% suggests a very low likelihood of exploitation in the wild. The flaw is not listed in CISA’s KEV catalog and requires an authenticated Administrator to perform the injection. Because the malicious code is stored and only executed when a user accesses a specific plugin page, the risk is primarily to users who trigger that page after an administrator has imported a malicious label. Overall, the threat is moderate but present for sites still running the affected plugin version.

Generated by OpenCVE AI on April 21, 2026 at 17:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Custom Post Type UI to a version newer than 1.18.1 (any released patch that removes the unsanitized import path).
  • If an upgrade is not immediately possible, disable or restrict the plugin’s import functionality to trusted administrators or remove the "label" field from import forms.
  • Audit existing custom post types for injected scripts and manually cleanse any malicious code from the label attribute before the page is served to users.

Generated by OpenCVE AI on April 21, 2026 at 17:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Webdevstudios
Webdevstudios custom Post Type Ui
Wordpress
Wordpress wordpress
Vendors & Products Webdevstudios
Webdevstudios custom Post Type Ui
Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Custom Post Type UI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'label' parameter during custom post type import in all versions up to, and including, 1.18.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the Tools → Get Code page.
Title Custom Post Type UI <= 1.18.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'label' Import Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Webdevstudios Custom Post Type Ui
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:24.591Z

Reserved: 2025-12-04T17:52:11.237Z

Link: CVE-2025-14056

cve-icon Vulnrichment

Updated: 2025-12-15T15:43:57.885Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:47.900

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:30:37Z

Weaknesses