
Cloud Vulnerability DB
A community-led vulnerabilities database
A stored Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Hand Talk plugin through version 6.0. The vulnerability was discovered and published to the CVE List on June 20, 2025, and was assigned identifier CVE-2025-50015. The affected software is the Hand Talk plugin developed by Rodrigo Bastos, impacting all versions up to and including version 6.0 (Wiz).
The vulnerability is classified as an Improper Neutralization of Input During Web Page Generation (CWE-79). According to the CVSS 3.1 scoring system, it has received a base score of 5.9 (Medium) with the following vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L. This indicates that the vulnerability requires high privileges and user interaction to exploit, but can potentially affect resources beyond the security scope of the affected component (Wiz, Patchstack).
The vulnerability allows malicious actors to inject malicious scripts into the website, which can then be executed when visitors access the affected pages. These scripts could potentially be used to redirect users, inject unwanted advertisements, or execute other malicious HTML payloads (Patchstack).
As of the vulnerability disclosure, no official fix has been made available for this security issue. Given its low severity impact and unlikely exploitation probability, the risk is considered minimal (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."