CVE-2025-5589

The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘status-classic-offline-text’ parameter in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

No configuration.

History

16 Jun 2025, 12:32

Type Values Removed Values Added
Summary
  • (es) El complemento StreamWeasels Kick Integration para WordPress es vulnerable a cross-site-scripting almacenado a través del parámetro 'status-classic-offline-text' en todas las versiones hasta la 1.1.3 incluida, debido a una depuración de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en páginas que se ejecutarán al acceder un usuario a una página inyectada.

14 Jun 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-14 09:15

Updated : 2025-06-16 12:32


NVD link : CVE-2025-5589

Mitre link : CVE-2025-5589

CVE.ORG link : CVE-2025-5589


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')