Description
The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'css_code' parameter in all versions up to, and including, 1.0.6 due to a missing capability check on the save_custome_code() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
* (semver)
Timeline
| 2025-10-23: | Vendor Notified |
| 2025-11-20: | Disclosed |
Credits
Ryan Kozak
References
www.wordfence.com/...-c4f7-4611-a22a-685d4421a4ab?source=cve
plugins.trac.wordpress.org/...s.wpb-admin-routes-handler.php
plugins.trac.wordpress.org/...ses/class.wpb-admin-routes.php
plugins.trac.wordpress.org/...ass.wpb-setting-controller.php
github.com/d0n601/CVE-2025-12135
ryankozak.com/posts/cve-2025-12135/
plugins.trac.wordpress.org/...wpbookit&sfp_email=&sfph_mail=