First published: Tue Apr 01 2025(Updated: )
The Groundhogg plugin for Wordpress is vulnerable to Stored Cross-Site Scripting via the ‘label' parameter in versions up to, and including, 3.7.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | <=3.7.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1267 is classified as a high-severity vulnerability due to the potential for Stored Cross-Site Scripting.
To fix CVE-2025-1267, update the Groundhogg plugin to version 3.7.4.2 or later.
CVE-2025-1267 affects versions of the Groundhogg plugin for WordPress up to and including 3.7.4.1.
CVE-2025-1267 is a Stored Cross-Site Scripting vulnerability stemming from insufficient input sanitization.
Yes, authenticated attackers with Administrator-level permissions can exploit CVE-2025-1267.