Stored Cross-Site Scripting in Radius Blocks Plugin for WordPress
CVE-2025-5844

6.4MEDIUM

What is CVE-2025-5844?

The Radius Blocks plugin for WordPress suffers from a vulnerability that allows authenticated users with Contributor-level access and higher to perform Stored Cross-Site Scripting attacks through the 'subHeadingTagName' parameter. This security flaw arises from inadequate input sanitization and output escaping, enabling attackers to embed malicious scripts on pages, which execute whenever a user accesses those pages. The issue affects all versions of the plugin up to and including 2.2.1, posing a significant risk to site security.

Affected Version(s)

Radius Blocks – WordPress Gutenberg Blocks * <= 2.2.1

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peter Thaleikis
.
CVE-2025-5844 : Stored Cross-Site Scripting in Radius Blocks Plugin for WordPress