UNKNOWN (0.0)
    Plugin

    AI Feeds Plugin Stored Cross-Site Scripting Vulnerability

    Published Date: 12/12/2025
    CVE ID: CVE-2025-14030

    Summary

    The AI Feeds plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'aife_post_meta' shortcode. This issue affects versions up to and including 1.0.22, allowing attackers with Contributor-level access to execute scripts within pages.

    Vulnerability Details

    Stored Cross-Site Scripting (XSS) vulnerabilities occur when an attacker is able to inject malicious scripts into webpages that are later accessed by other users. In the case of the AI Feeds plugin for WordPress, the vulnerability arises from inadequate input sanitization and output escaping of user-provided data through the 'aife_post_meta' shortcode. An attacker with Contributor-level access or higher can exploit this flaw to inject arbitrary web scripts. These scripts are then executed in the context of any users who view the page, potentially leading to session hijacking, defacement, or redirection to malicious sites. This vulnerability is particularly concerning for sites that allow multiple contributors, as it lowers the bar for potential attackers to execute harmful scripts.

    Recommendations

    To mitigate this vulnerability, it is essential to apply input validation and output escaping properly. Use functions like `esc_html()` and `sanitize_text_field()` to sanitize user inputs and escape outputs in WordPress. Limiting the roles that can use specific shortcodes and reviewing permissions for contributor roles can also reduce risk.

    Available Fixes

    Last Updated: 12/13/2025
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2025 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More