
Cloud Vulnerability DB
A community-led vulnerabilities database
The WP-Iconics WordPress plugin (versions <= 0.0.4) contains a Stored Cross-Site Scripting vulnerability identified as CVE-2025-12671. The vulnerability was publicly disclosed on November 10, 2025, and was last updated on November 11, 2025. The vulnerability affects multiple parameters of the 'wp_iconics' shortcode in the plugin (AttackerKB, Wordfence).
The vulnerability is classified as a Stored Cross-Site Scripting (XSS) issue that affects authenticated users with Contributor level access or higher. The vulnerability has been assigned a CVSS score of 6.4 (Medium), indicating a moderate severity level (Wordfence).
As a Stored XSS vulnerability, successful exploitation could allow attackers to inject malicious scripts that would be executed in other users' browsers when viewing affected pages. This could lead to session hijacking, credential theft, or other client-side attacks (AttackerKB).
The plugin has been temporarily closed and is no longer available for download from the WordPress plugin repository as of November 7, 2025. Users are advised to remove the plugin from their WordPress installations until a security review is completed and a patched version is released (WordPress).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."