Cross-site Scripting Vulnerability in SpeakOut! Email Petitions Plugin
CVE-2025-22309

6.5MEDIUM

Key Information:

Vendor
WordPress
Vendor
CVE Published:
7 January 2025

Summary

The SpeakOut! Email Petitions plugin for WordPress is susceptible to a DOM-Based Cross-site Scripting (XSS) vulnerability, whereby improper validation of user input during web page generation can allow attackers to execute arbitrary JavaScript in the context of the user's session. This may lead to unauthorized actions on behalf of users, potentially compromising sensitive information. Users of versions prior to 4.4.2 are particularly at risk and are advised to apply security updates to mitigate this issue.

Affected Version(s)

SpeakOut! Email Petitions <= 4.4.2

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

LVT-tholv2k (Patchstack Alliance)
.