First published: Sat Mar 08 2025(Updated: )
The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'public-form' shortcode in all versions up to, and including, 16.26.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Plechev Andrey WP-Recall | <16.26.12 | |
WP-Recall | <=16.26.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1324 is classified as a medium severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2025-1324, update the WP-Recall plugin to version 16.26.11 or later, which includes patches for the vulnerability.
CVE-2025-1324 is a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts into the user interface.
All versions of the WP-Recall plugin up to and including version 16.26.10 are affected by CVE-2025-1324.
CVE-2025-1324 can lead to unauthorized script execution in the browser of users, potentially compromising their data and security.