Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pixelgrade Category Icon category-icon allows Stored XSS.This issue affects Category Icon: from n/a through <= 1.0.2.
Published: 2025-12-24
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper neutralization of input during web page generation in the Pixelgrade Category Icon plugin allows a stored cross‑site scripting (XSS) vulnerability. A malicious actor can inject client‑side script that will be executed when any user views a page containing the stored payload, potentially leading to cookie theft, session hijacking, or site defacement.

Affected Systems

The vulnerability affects the Pixelgrade Category Icon plugin for WordPress, versions from the initial release up through 1.0.2. Any WordPress site that has installed a vulnerable version of this plugin is susceptible to the stored XSS flaw.

Risk and Exploitability

The CVSS score of 5.9 indicates a moderate risk, while the EPSS score of <1% suggests a low probability of exploitation at present. The vulnerability is not recorded in the CISA KEV catalog. Based on the nature of the flaw – stored XSS – the likely attack vector is a web‑based one where an attacker submits malicious script through the plugin’s input fields, which is then rendered to users who view the affected content. Exploitation would require access to the plugin’s input channels but does not need privileged system access.

Generated by OpenCVE AI on April 29, 2026 at 15:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Pixelgrade Category Icon plugin to the latest available version, which removes the stored XSS flaw.
  • If an upgrade is not immediately possible, disable or uninstall the Category Icon plugin to eliminate the attack surface.
  • As a temporary workaround, configure the server to sanitize or strip JavaScript from category icon inputs before storing, ensuring only safe markup is saved.

Generated by OpenCVE AI on April 29, 2026 at 15:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 12:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pixelgrade Category Icon category-icon allows Stored XSS.This issue affects Category Icon: from n/a through <= 1.0.2.
Title WordPress Category Icon plugin <= 1.0.2 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:29.559Z

Reserved: 2025-12-19T10:17:03.705Z

Link: CVE-2025-68525

cve-icon Vulnrichment

Updated: 2025-12-24T19:08:49.183Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:21.997

Modified: 2026-04-27T19:16:28.027

Link: CVE-2025-68525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T15:45:14Z

Weaknesses