First published: Fri May 02 2025(Updated: )
The WPML plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpml_language_switcher shortcode in versions 3.6.0 - 4.7.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPML Multilingual CMS | >=3.6.0<=4.7.3 | |
WPML | >=3.6.0<=4.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3488 affects WPML plugin versions 3.6.0 to 4.7.3.
CVE-2025-3488 is a Stored Cross-Site Scripting vulnerability.
To fix CVE-2025-3488, update the WPML plugin to a version later than 4.7.3.
CVE-2025-3488 allows authenticated attackers to inject malicious scripts that can be executed by users.
CVE-2025-3488 is caused by insufficient input sanitization and output escaping on user-supplied attributes in the wpml_language_switcher shortcode.