Description
The AD Sliding FAQ plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sliding_faq' shortcode in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-01-07
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that allows injection of arbitrary scripts into pages viewed by any visitor
Action: Apply Patch
AI Analysis

Impact

The AD Sliding FAQ plugin for WordPress contains a stored XSS flaw that arises when the "sliding_faq" shortcode is used with insufficiently sanitized attributes. Authenticated users who have contributor‑level access or higher can insert code that will be rendered and executed whenever a page containing the injected shortcode is viewed by any user. The injected scripts could be used for defacement, credential theft, or session hijacking; however, such specific outcomes are not explicitly detailed in the CVE description and are inferred from the nature of stored XSS.

Affected Systems

WordPress sites that run anybodesign’s AD Sliding FAQ plugin version 2.4 or earlier are affected; all such installations are vulnerable regardless of other configurations. The flaw exists in versions up to and including 2.4 and does not impact newer releases that have patched the issue.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.4, indicating a moderate impact, and an EPSS score of less than 1 %, showing a very low but non‑zero likelihood of exploitation. It is not listed in the CISA KEV catalog. Attack requires authenticated contributor or higher access to inject the malicious attributes, so the threat is limited to trusted users or compromised accounts within the site, but compromises the trust boundary of all site visitors.

Generated by OpenCVE AI on April 21, 2026 at 00:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the AD Sliding FAQ plugin to a version that removes the XSS flaw
  • If an upgrade is not immediately possible, restrict the use of the sliding_faq shortcode by removing or disabling it for untrusted users
  • Revoke contributor‑level permissions from users who do not need it and enforce a least‑privilege model

Generated by OpenCVE AI on April 21, 2026 at 00:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description The AD Sliding FAQ plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sliding_faq' shortcode in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title AD Sliding FAQ <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:26:26.562Z

Reserved: 2025-12-05T16:26:14.854Z

Link: CVE-2025-14122

cve-icon Vulnrichment

Updated: 2026-01-07T14:52:28.093Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:53.163

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14122

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:45:23Z

Weaknesses