First published: Thu Apr 17 2025(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tychesoftwares Arconix FAQ allows Reflected XSS. This issue affects Arconix FAQ: from n/a through 1.9.5.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Arconix FAQ | <=1.9.5 | |
WordPress Arconix FAQ plugin | <=1.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32531 has a critical severity level due to its potential for reflected cross-site scripting (XSS) attacks.
To fix CVE-2025-32531, upgrade the Arconix FAQ plugin to version 1.9.6 or higher.
CVE-2025-32531 affects Arconix FAQ versions up to and including 1.9.5.
Yes, CVE-2025-32531 can lead to data theft as attackers can exploit the reflected XSS vulnerability to execute malicious scripts.
Yes, user input in Arconix FAQ is susceptible to CVE-2025-32531, making it critical to properly sanitize and validate inputs.