
Cloud Vulnerability DB
A community-led vulnerabilities database
The WP Airbnb Review Slider plugin for WordPress contains a Stored Cross-Site Scripting vulnerability (CVE-2025-12520) discovered in versions up to and including 4.2. The vulnerability was disclosed on November 3, 2025, and affects the plugin's admin settings functionality. The issue stems from insufficient URL validation that allows users to pull in malicious HTML files, enabling authenticated attackers with administrator-level permissions to inject arbitrary web scripts (CyberResearchHub, NVD).
The vulnerability exists due to the plugin accepting arbitrary URLs validated only with FILTER_VALIDATE_URL, which performs a basic format check. When a URL is provided, the plugin fetches the HTML content and writes it directly to airbnbusercapture.html in the plugin directory without proper content-type validation or sanitization. Additionally, elements of the fetched response are stored in the plugin's database without HTML sanitization and later rendered in both admin and frontend contexts. The vulnerability has been assigned a CVSS v3.1 score of 4.0 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N (CyberResearchHub).
The vulnerability can lead to multiple security issues: Server-Side Request Forgery (SSRF) allowing attackers to request internal network resources, metadata endpoints, or attacker-controlled servers, and Stored Cross-Site Scripting (XSS) enabling the execution of malicious scripts in users' browsers. This could potentially result in session theft, persistence of malicious payloads, and admin account compromise. The impact is particularly severe for sites that allow plugin configuration by non-trusted roles or run services on localhost/internal networks (CyberResearchHub).
The vulnerability has been patched in version 4.3 of the WP Airbnb Review Slider plugin. The fix includes several security improvements: destination verification to restrict outbound fetches to validated Airbnb domains, prevention of direct writing of remote responses to web-executable plugin files, and implementation of proper sanitization and escaping for all content derived from remote sources. Users are strongly advised to update to version 4.3 or later (CyberResearchHub, WordPress Plugin Repository).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."