Description
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's oceanwp_library shortcode in all versions up to, and including, 2.4.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-08-30
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting with contributor‑level authentication required
Action: Apply Patch
AI Analysis

Impact

The Ocean Extra plugin allows an authenticated user with contributor or higher permissions to embed arbitrary scripts in a site page via the oceanwp_library shortcode. Unsanitized user supplied attributes enable a stored cross‑site scripting flaw, identified as CWE‑79. When the malicious page is loaded by any visitor the injected scripts execute, compromising confidentiality, integrity, and potentially availability of the site content.

Affected Systems

WordPress sites that have the Ocean Extra plugin installed in any version up to and including 2.4.9 are affected. Site administrators, developers, and owners using this plugin must verify their installed version and upgrade if necessary.

Risk and Exploitability

The CVSS score is 6.4, indicating moderate severity, while the EPSS score is less than 1 %, suggesting a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires only contributor‑level authentication and does not rely on privileged or administrative access, which makes it feasible for well‑positioned attackers. However, the low exploit probability and lack of public exploitation evidence imply that the risk is moderate but still noteworthy.

Generated by OpenCVE AI on April 22, 2026 at 14:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Ocean Extra to version 2.5.0 or later to remove the vulnerable shortcode handling.
  • Disable or remove the oceanwp_library shortcode entirely from all pages or posts where it is not needed.
  • Restrict contributor roles or implement stricter role management so that only trusted users can publish or edit content that may contain the shortcode.

Generated by OpenCVE AI on April 22, 2026 at 14:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28862 The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's oceanwp_library shortcode in all versions up to, and including, 2.4.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 02 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 31 Aug 2025 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Oceanwp
Oceanwp ocean Extra
Wordpress
Wordpress wordpress
Vendors & Products Oceanwp
Oceanwp ocean Extra
Wordpress
Wordpress wordpress

Sat, 30 Aug 2025 04:30:00 +0000

Type Values Removed Values Added
Description The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's oceanwp_library shortcode in all versions up to, and including, 2.4.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Ocean Extra <= 2.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via oceanwp_library Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Oceanwp Ocean Extra
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:15.780Z

Reserved: 2025-08-26T18:29:32.475Z

Link: CVE-2025-9499

cve-icon Vulnrichment

Updated: 2025-09-02T15:14:03.960Z

cve-icon NVD

Status : Deferred

Published: 2025-08-30T05:15:48.230

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9499

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:30:18Z

Weaknesses