Stored Cross-Site Scripting in Newsletter WordPress Plugin by WordPress
CVE-2025-3581

Currently unrated

Key Information:

Vendor

WordPress

Vendor
CVE Published:
9 June 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-3581?

The Newsletter plugin for WordPress, prior to version 8.8.5, suffers from a vulnerability that allows stored cross-site scripting (XSS) attacks. This is due to a lack of validation and escaping of various Widget options before they are rendered on a page or post. Consequently, users with high privileges, like administrators, may inadvertently inject malicious scripts, even in configurations where the unfiltered_html capability is restricted, such as in multisite environments. Mitigation steps include upgrading to the latest version and ensuring best practices for user permissions.

Affected Version(s)

Newsletter 0 < 8.8.5

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
WPScan
.
CVE-2025-3581 : Stored Cross-Site Scripting in Newsletter WordPress Plugin by WordPress