Stored Cross-Site Scripting Vulnerability in Newsletter WordPress Plugin
CVE-2025-3582

Currently unrated

Key Information:

Vendor

WordPress

Vendor
CVE Published:
9 June 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-3582?

The Newsletter plugin for WordPress, prior to version 8.85, fails to properly sanitize and escape certain form settings. This oversight allows high privilege users, such as administrators, to exploit the vulnerability and conduct stored Cross-Site Scripting (XSS) attacks. This poses a significant risk, particularly in multisite setups where the unfiltered_html capability is restricted, potentially leading to unauthorized script execution and data compromise.

Affected Version(s)

Newsletter 0 < 8.85

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
WPScan
.
CVE-2025-3582 : Stored Cross-Site Scripting Vulnerability in Newsletter WordPress Plugin