Description
The WP Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2025-05-28
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

The WP Extended plugin allows authenticated users with Author level or higher to upload SVG files that are stored without proper sanitization or escaping. This flaw permits the injection of arbitrary JavaScript, which will execute when any user views the SVG file. The weakness is classified as CWE‑79, indicating a failure to protect against cross‑site scripting attacks.

Affected Systems

The vulnerability exists in all releases of the WP Extended plugin up to and including version 3.0.15. Users of earlier releases must install the plugin from the WordPress repository or from the vendor’s website, and verify that the plugin version is 3.0.15 or older.

Risk and Exploitability

The CVSS score of 6.4 reflects a moderate severity. The EPSS score indicates a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. An attacker needs authenticated access at the Author level or higher and must upload a malicious SVG. Once uploaded, any user who opens the SVG will cause the injected script to run, potentially allowing the attacker to steal session data, deface the site, or further exploit client browsers. Due to the authentication requirement, the potential impact is limited to sites with compromised author accounts but can be severe for site visitors if their session is hijacked.

Generated by OpenCVE AI on April 20, 2026 at 22:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Extended plugin to version 3.0.16 or newer, which implements proper SVG sanitization and output escaping.
  • If an upgrade is not immediately possible, restrict SVG uploads to trusted administrators only or disable SVG file uploads entirely until a patch is applied.
  • Implement or strengthen Content Security Policy headers to block inline script execution, reducing the risk of XSS from uploaded SVG content.

Generated by OpenCVE AI on April 20, 2026 at 22:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16321 The WP Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
History

Wed, 28 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 May 2025 09:30:00 +0000

Type Values Removed Values Added
Description The WP Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title WP Extended <= 3.0.15 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:31:04.737Z

Reserved: 2025-05-19T19:18:31.576Z

Link: CVE-2025-4963

cve-icon Vulnrichment

Updated: 2025-05-28T13:27:13.686Z

cve-icon NVD

Status : Deferred

Published: 2025-05-28T10:15:21.687

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:45:20Z

Weaknesses