Description
The Featured Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image metadata in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
* (semver)
Timeline
| 2025-11-10: | Disclosed |
Credits
Chris
References
github.com/.../wordpress/plugin/featured-image/stored-xss.md
www.wordfence.com/...-12bd-48a8-b9a9-db53bf3c2c39?source=cve
wordpress.org/plugins/featured-image/
github.com/.../wordpress/plugin/featured-image/stored-xss.md
plugins.trac.wordpress.org/...ge/tags/2.1/featured-image.php
plugins.trac.wordpress.org/...ge/tags/2.1/featured-image.php
plugins.trac.wordpress.org/...ge/tags/2.1/featured-image.php