Description
Improper Control of Generation of Code ('Code Injection') vulnerability in GS Plugins GS Testimonial Slider gs-testimonial allows Code Injection.This issue affects GS Testimonial Slider: from n/a through <= 3.2.9.
Published: 2025-05-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an Improper Control of Generation of Code, allowing attackers to inject malicious code into the GS Testimonial Slider plugin. This flaw, classified as CWE‑94, can enable arbitrary code execution if an attacker can manipulate the content that the plugin processes. The impact is potentially severe because injected code may run with the privileges of the web application host, compromising the entire WordPress site.

Affected Systems

The affected product is GS Plugins GS Testimonial Slider for WordPress, with all releases from the earliest version up through version 3.2.9 vulnerable. Users of this plugin on their WordPress installations should verify the installed version and note that any instance running 3.2.9 or earlier is vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, but the EPSS score of less than 1% suggests a very low likelihood of exploitation in the wild at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the injection can be triggered through user‑submitted content fields within the testimonial slider, meaning that authenticated users able to add or edit testimonials may be able to inject code. No explicit exploitation details are provided, so the exact attack vector is inferred from normal usage of the plugin.

Generated by OpenCVE AI on April 30, 2026 at 20:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the GS Testimonial Slider plugin to a version newer than 3.2.9 where this issue is corrected.
  • If an upgrade is not possible, remove or deactivate the plugin to eliminate the risk.
  • As a temporary workaround, configure the plugin or WordPress to sanitize testimonial content by stripping disallowed tags and attributes, reducing the chance that injected code can execute.

Generated by OpenCVE AI on April 30, 2026 at 20:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13840 Improper Control of Generation of Code ('Code Injection') vulnerability in GS Plugins GS Testimonial Slider allows Code Injection. This issue affects GS Testimonial Slider: from n/a through 3.2.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in GS Plugins GS Testimonial Slider allows Code Injection. This issue affects GS Testimonial Slider: from n/a through 3.2.9. Improper Control of Generation of Code ('Code Injection') vulnerability in GS Plugins GS Testimonial Slider gs-testimonial allows Code Injection.This issue affects GS Testimonial Slider: from n/a through <= 3.2.9.
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00056}

epss

{'score': 0.00058}


Thu, 08 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 14:30:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in GS Plugins GS Testimonial Slider allows Code Injection. This issue affects GS Testimonial Slider: from n/a through 3.2.9.
Title WordPress GS Testimonial Slider plugin <= 3.2.9 - Content Injection vulnerability
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:42.588Z

Reserved: 2025-05-07T09:39:08.090Z

Link: CVE-2025-47481

cve-icon Vulnrichment

Updated: 2025-05-08T16:12:27.573Z

cve-icon NVD

Status : Deferred

Published: 2025-05-07T15:16:02.233

Modified: 2026-04-23T15:30:18.277

Link: CVE-2025-47481

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T20:45:36Z

Weaknesses