
Cloud Vulnerability DB
A community-led vulnerabilities database
The Limit Bio WordPress plugin through version 1.0 contains a security vulnerability identified as CVE-2025-1436. The vulnerability was discovered by Bob Matyas and was publicly disclosed on February 20, 2025. This security issue affects the plugin's settings update functionality, potentially exposing WordPress installations to cross-site scripting attacks (WPScan, NVD).
The vulnerability stems from two primary security issues: the absence of CSRF (Cross-Site Request Forgery) checks when updating plugin settings, and inadequate sanitization and escaping of input data. The vulnerability has been assigned a CVSS v3.1 score of 7.1 (High), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L. The issue is classified under CWE-79, which relates to Cross-Site Scripting (XSS) vulnerabilities, and falls under the OWASP Top 10 category A7: Cross-Site Scripting (WPScan).
When exploited, this vulnerability allows attackers to execute stored XSS payloads through CSRF attacks targeting logged-in administrators. The successful exploitation could lead to the compromise of administrative functions and potentially affect the integrity of the WordPress installation (WPScan).
Currently, there is no known fix available for this vulnerability in the Limit Bio WordPress plugin. Website administrators running affected versions should consider disabling the plugin until a security patch is released (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."