CVE-2025-13626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in realloc myLCO
The myLCO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13626 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the myLCO plugin for WordPress, developed by realloc. The vulnerability exists due to improper neutralization of input during web page generation, specifically involving the $_SERVER['PHP_SELF'] parameter. This parameter is used in the plugin without adequate input sanitization or output escaping, allowing attackers to inject arbitrary JavaScript code into web pages. Since the vulnerability is reflected, the malicious script is embedded in a URL or request that the victim must interact with, typically by clicking a crafted link. The vulnerability affects all versions of myLCO up to and including 0.8.1. Exploitation does not require authentication, increasing the risk surface, but does require user interaction. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, meaning network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly to prevent potential attacks such as session hijacking, credential theft, or phishing.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of user data. An attacker exploiting this reflected XSS can execute arbitrary scripts in the context of the victim's browser, potentially stealing session cookies, redirecting users to malicious sites, or performing actions on behalf of the user. Although availability is not affected, the compromise of user sessions or credentials can lead to further attacks within the affected WordPress site or connected systems. Organizations using the myLCO plugin are at risk of reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. Since the vulnerability requires user interaction, the impact depends on the success of social engineering efforts. The scope is significant because WordPress powers a large portion of websites globally, and the myLCO plugin may be used in diverse sectors, including small businesses, blogs, and possibly larger enterprises. Without mitigation, attackers could leverage this vulnerability to conduct targeted phishing campaigns or broader attacks against site visitors.
Mitigation Recommendations
1. Immediate upgrade: Organizations should update the myLCO plugin to a version that addresses this vulnerability once released by realloc. 2. Input validation and output encoding: Developers should ensure that all user-controllable inputs, especially $_SERVER['PHP_SELF'], are properly sanitized and escaped before rendering in HTML contexts. 3. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block reflected XSS payloads targeting the affected plugin. 4. Content Security Policy (CSP): Implement strict CSP headers to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. 5. User awareness: Educate users about the risks of clicking suspicious links, especially those that appear to come from untrusted sources. 6. Monitoring and logging: Enable detailed logging of web requests to detect suspicious activity indicative of attempted exploitation. 7. Disable or restrict the plugin temporarily if patching is not immediately possible, especially on high-risk or public-facing sites. 8. Regular security assessments: Conduct periodic vulnerability scans and penetration tests focusing on plugins and third-party components.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-13626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in realloc myLCO
Description
The myLCO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13626 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the myLCO plugin for WordPress, developed by realloc. The vulnerability exists due to improper neutralization of input during web page generation, specifically involving the $_SERVER['PHP_SELF'] parameter. This parameter is used in the plugin without adequate input sanitization or output escaping, allowing attackers to inject arbitrary JavaScript code into web pages. Since the vulnerability is reflected, the malicious script is embedded in a URL or request that the victim must interact with, typically by clicking a crafted link. The vulnerability affects all versions of myLCO up to and including 0.8.1. Exploitation does not require authentication, increasing the risk surface, but does require user interaction. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, meaning network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly to prevent potential attacks such as session hijacking, credential theft, or phishing.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of user data. An attacker exploiting this reflected XSS can execute arbitrary scripts in the context of the victim's browser, potentially stealing session cookies, redirecting users to malicious sites, or performing actions on behalf of the user. Although availability is not affected, the compromise of user sessions or credentials can lead to further attacks within the affected WordPress site or connected systems. Organizations using the myLCO plugin are at risk of reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. Since the vulnerability requires user interaction, the impact depends on the success of social engineering efforts. The scope is significant because WordPress powers a large portion of websites globally, and the myLCO plugin may be used in diverse sectors, including small businesses, blogs, and possibly larger enterprises. Without mitigation, attackers could leverage this vulnerability to conduct targeted phishing campaigns or broader attacks against site visitors.
Mitigation Recommendations
1. Immediate upgrade: Organizations should update the myLCO plugin to a version that addresses this vulnerability once released by realloc. 2. Input validation and output encoding: Developers should ensure that all user-controllable inputs, especially $_SERVER['PHP_SELF'], are properly sanitized and escaped before rendering in HTML contexts. 3. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block reflected XSS payloads targeting the affected plugin. 4. Content Security Policy (CSP): Implement strict CSP headers to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. 5. User awareness: Educate users about the risks of clicking suspicious links, especially those that appear to come from untrusted sources. 6. Monitoring and logging: Enable detailed logging of web requests to detect suspicious activity indicative of attempted exploitation. 7. Disable or restrict the plugin temporarily if patching is not immediately possible, especially on high-risk or public-facing sites. 8. Regular security assessments: Conduct periodic vulnerability scans and penetration tests focusing on plugins and third-party components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-24T21:17:12.700Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933c71e11163305efef3dcf
Added to database: 12/6/2025, 6:03:10 AM
Last enriched: 2/27/2026, 10:05:26 AM
Last updated: 3/26/2026, 3:46:53 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.