
Cloud Vulnerability DB
A community-led vulnerabilities database
The WP ViewSTL WordPress plugin versions up to and including 1.0 contains a Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2025-22742. The vulnerability was discovered by researcher SOPROBRO and publicly disclosed on January 14, 2025. This security issue affects authenticated users with contributor-level access or higher (WPScan, Patchstack).
The vulnerability stems from insufficient input sanitization and output escaping in the WP ViewSTL plugin. It has been assigned a CVSS score of 6.4-6.5 (Medium severity) and is classified under OWASP Top 10 category A7: Cross-Site Scripting (XSS) and CWE-79. The security issue allows authenticated users with contributor-level privileges or higher to inject arbitrary web scripts into pages (WPScan, Patchstack).
When exploited, this vulnerability allows attackers to inject malicious scripts, including redirects, advertisements, and other HTML payloads into the website. These injected scripts will execute whenever users access the affected pages. The impact is particularly concerning as the injected scripts run in the context of other users' browsers who visit the compromised pages (Patchstack).
Currently, there is no official fix available for this vulnerability. The recommended mitigation strategy is to remove and replace the WP ViewSTL plugin with an alternative solution, as the software is considered abandoned and unlikely to receive future updates or security fixes (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."