First published: Sat Jan 18 2025(Updated: )
The Podlove Podcast Publisher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Feed Name value in version <= 4.1.25 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Podlove Podcast Publisher | <=4.1.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0554 is rated as a high-severity vulnerability due to the potential for authenticated attackers to exploit it.
To fix CVE-2025-0554, you should update the Podlove Podcast Publisher plugin to version 4.1.26 or later.
Users of the Podlove Podcast Publisher plugin for WordPress running version 4.1.25 or earlier are vulnerable to CVE-2025-0554.
CVE-2025-0554 is identified as a Stored Cross-Site Scripting (XSS) vulnerability.
Authenticated attackers with administrator-level access can inject malicious scripts through the Feed Name value, potentially compromising site security.