First published: Wed Mar 26 2025(Updated: )
The Ayyash Studio — The kick-start kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ayyash Studio | <=1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2576 has a medium severity due to the potential for stored cross-site scripting attacks.
To fix CVE-2025-2576, update the Ayyash Studio plugin to version 1.0.4 or later.
CVE-2025-2576 affects users of the Ayyash Studio plugin for WordPress up to version 1.0.3.
CVE-2025-2576 is categorized as a stored cross-site scripting vulnerability.
No, only authenticated users can exploit CVE-2025-2576 due to the nature of the vulnerability.