Description
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'oceanwp_icon' shortcode in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-04-22
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via Shortcode
Action: Patch Upgrade
AI Analysis

Impact

The Ocean Extra plugin contains a Stored XSS flaw in its oceanwp_icon shortcode. The flaw arises because attributes supplied to the shortcode are not properly sanitized or escaped, enabling an authenticated user with contributor‑level access or higher to inject JavaScript that is stored in the post content. When a victim views the page containing the injected content, the malicious script runs in that visitor’s browser, potentially stealing credentials, hijacking sessions, or defacing the site.

Affected Systems

All installations of the Ocean Extra WordPress plugin version 2.4.6 or earlier are affected. The plugin is distributed under the Ocean Extra product from OceanWP. The vulnerability can be present in any WordPress site that has the plugin installed and the oceanwp_icon shortcode enabled.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS value is reported at less than 1%, suggesting a low probability of exploitation. The plugin is not listed in the CISA KEV catalog. Because the flaw requires authenticated contributor‑level access, an attacker must first obtain or abuse such credentials, which is a prerequisite before the stored XSS payload can be injected. Once the malicious script is stored, it executes in the browsers of all visitors who view the modified page, granting the attacker client‑side control and potential credential theft.

Generated by OpenCVE AI on April 21, 2026 at 21:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ocean Extra to the latest version that removes the stored XSS vulnerability in the oceanwp_icon shortcode.
  • If an upgrade is not immediately possible, remove or disable the oceanwp_icon shortcode so it cannot be used to embed malicious content.
  • Limit contributor‑level access to trusted users and regularly audit user roles to reduce the likelihood that an authenticated attacker can inject payloads.

Generated by OpenCVE AI on April 21, 2026 at 21:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12292 The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'oceanwp_icon' shortcode in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 30 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Oceanwp
Oceanwp ocean Extra
CPEs cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*
Vendors & Products Oceanwp
Oceanwp ocean Extra

Tue, 22 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 22 Apr 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'oceanwp_icon' shortcode in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Ocean Extra <= 2.4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Oceanwp Ocean Extra
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:46:07.043Z

Reserved: 2025-04-08T22:21:52.250Z

Link: CVE-2025-3457

cve-icon Vulnrichment

Updated: 2025-04-22T13:23:45.382Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-22T12:15:16.350

Modified: 2025-04-30T14:07:52.490

Link: CVE-2025-3457

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:15:45Z

Weaknesses