First published: Tue Apr 22 2025(Updated: )
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'oceanwp_icon' shortcode in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
OceanWP Ocean Extra | <=2.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3457 is classified as a medium-severity vulnerability due to its potential for exploitation via Stored Cross-Site Scripting.
To fix CVE-2025-3457, update the Ocean Extra plugin to a version higher than 2.4.6, which has addressed the issue.
All users of the Ocean Extra plugin for WordPress up to and including version 2.4.6 are affected by CVE-2025-3457.
CVE-2025-3457 is a Stored Cross-Site Scripting (XSS) vulnerability.
CVE-2025-3457 is caused by insufficient input sanitization and output escaping on user-supplied attributes in the 'oceanwp_icon' shortcode.