CVE-2025-12520

CVSS 4.0 Medium
  • CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N
  • Published: 2025-11-07T06:15:33.013

The WP Airbnb Review Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.2 due to insufficient URL validation that allows users to pull in a malicious HTML file. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Related CVE by CWE

No related CWE found.

Top CVE for Vendor

No vendor taxonomy on this entry.

Recently Exploited Similar Vulnerabilities

No recent KEV-listed items for this vendor/product.

How to fix CVE-2025-12520

CVE-2025-12520 is a medium severity vulnerability affecting the affected product.

Description: The WP Airbnb Review Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.2 due to insufficient URL validation that allows users to pull in a malicious HTML file. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary […]

Affected Versions:
Vulnerable: ≤ 4.2
Safe: ≥ 4.3

Exploit Difficulty: VERY HARD
⏱️ Time to exploit: Days or weeks
🛠️ Required skills: Expert-level security skills
💰 Public exploits: Not publicly available

How to Fix:

1 Identify affected systems

- Check if you're running the affected product
- Verify version (vulnerable: ≤ 4.2)

2 Immediate actions

- Update to ≥ 4.3 or later
- If patching is not immediately possible: restrict network exposure, apply least-privilege access

3 Verification

- Test the fix in a staging environment first
- Review logs for signs of exploitation
- Monitor for IOCs (Indicators of Compromise)

4 Long-term prevention

- Enable automatic security updates
- Set up vulnerability monitoring
- Review and harden security configurations

Exploit Difficulty Assessment

VERY HARD
⏱️ Time to Exploit: Days or weeks
🛠️ Skills Required: Expert-level security skills
💰 Public Exploits: Not publicly available

Affected Versions

Vulnerable: ≤ 4.2
Safe: ≥ 4.3

Vulnerability Timeline

Nov 07, 2025
Vulnerability Published

CVE details first published to NVD database

Nov 12, 2025
Imported to Database

Added to this CVE tracking system

Detection Rules & IOCs

No specific detection rules generated for this vulnerability type.

No vendor/product data available.