Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15363: CWE-79 Cross-Site Scripting (XSS) in Get Use APIs

0
High
VulnerabilityCVE-2025-15363cvecve-2025-15363cwe-79
Published: Wed Mar 18 2026 (03/18/2026, 06:00:09 UTC)
Source: CVE Database V5
Product: Get Use APIs

Description

CVE-2025-15363 is a Cross-Site Scripting (XSS) vulnerability in the Get Use APIs WordPress plugin versions before 2. 0. 10. It allows users with contributor-level permissions to execute malicious scripts by exploiting the plugin's handling of imported JSON data under certain server configurations. This vulnerability arises because the plugin executes imported JSON without proper sanitization, enabling attackers to inject and run arbitrary JavaScript code. Although no known exploits are currently reported in the wild, the flaw poses a significant risk to websites using this plugin, especially those permitting contributor roles. Exploitation could lead to session hijacking, defacement, or redirection to malicious sites. Mitigations include updating to version 2. 0. 10 or later once available, restricting contributor permissions, and implementing strict input validation and output encoding.

AI-Powered Analysis

AILast updated: 03/18/2026, 06:43:30 UTC

Technical Analysis

CVE-2025-15363 is a security vulnerability classified as CWE-79 (Cross-Site Scripting) affecting the Get Use APIs WordPress plugin prior to version 2.0.10. The vulnerability stems from the plugin's unsafe execution of imported JSON data, which lacks proper sanitization and validation. This flaw enables users with contributor-level access—a relatively low privilege role in WordPress—to inject malicious JavaScript code that executes in the context of the affected website. The exploitation scenario typically involves an attacker submitting crafted JSON data through the plugin's import functionality. Under certain server configurations, this malicious script is executed by the browser of users visiting the compromised site or administrators reviewing the imported data. The consequences of successful exploitation include theft of authentication cookies, session hijacking, unauthorized actions on behalf of other users, defacement, or redirecting users to malicious websites. Although no public exploits have been reported yet, the vulnerability is particularly concerning because contributor roles are commonly assigned to trusted users who can submit content but not publish it directly, thus broadening the attack surface. The absence of a CVSS score indicates that the vulnerability is newly disclosed, but the technical details and attack vector suggest a significant risk. The vulnerability was reserved at the end of 2025 and published in early 2026, indicating recent discovery. No official patch links are currently available, emphasizing the need for immediate attention from site administrators. The vulnerability affects all installations of the Get Use APIs plugin before 2.0.10, which is used in WordPress environments worldwide, especially in content-heavy websites. The plugin's market penetration is not as widespread as core WordPress components but is significant enough to warrant concern. The vulnerability's exploitation requires no user interaction beyond the contributor role's permissions, making it easier to exploit than vulnerabilities requiring higher privileges or complex social engineering. The lack of authentication bypass means the attacker must have contributor access, but this is often granted to multiple users in many organizations. The vulnerability impacts confidentiality and integrity primarily, with potential availability impact if attackers deface or disrupt site content. Given these factors, the vulnerability is assessed as high severity.

Potential Impact

The impact of CVE-2025-15363 on organizations worldwide can be substantial, especially for those relying on the Get Use APIs plugin in their WordPress installations. Since contributor-level users can exploit this vulnerability, attackers can inject malicious scripts that execute in the browsers of site visitors or administrators. This can lead to session hijacking, allowing attackers to impersonate legitimate users and potentially escalate privileges or perform unauthorized actions. The injected scripts could also be used to deface websites, damaging brand reputation and user trust. Additionally, attackers might redirect users to phishing or malware distribution sites, increasing the risk of broader compromise. For organizations handling sensitive data or operating e-commerce platforms, such attacks could result in data breaches, financial loss, and regulatory penalties. The vulnerability also increases the attack surface by enabling insider threats or compromised contributor accounts to be leveraged for malicious purposes. Although no known exploits are currently in the wild, the ease of exploitation and low privilege requirement mean that the risk of future attacks is high. The impact extends beyond individual sites to potentially affect the broader WordPress ecosystem, given the plugin's usage in multiple countries and sectors.

Mitigation Recommendations

To mitigate CVE-2025-15363 effectively, organizations should take the following specific actions: 1) Immediately audit WordPress sites for the presence of the Get Use APIs plugin and identify versions prior to 2.0.10. 2) Apply updates to version 2.0.10 or later as soon as the patch becomes available, or contact the plugin vendor for interim fixes or workarounds. 3) Restrict contributor role permissions by limiting the number of users assigned this role and reviewing their activities regularly. 4) Implement strict input validation and output encoding on any JSON import functionality, ensuring that imported data cannot execute scripts. 5) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious JSON payloads or script injections targeting the plugin's endpoints. 6) Monitor logs for unusual contributor activity or unexpected JSON imports. 7) Educate content contributors about security best practices and the risks of importing untrusted data. 8) Consider temporarily disabling the JSON import feature if it is not essential, reducing the attack surface. 9) Regularly back up website data and configurations to enable quick recovery in case of compromise. These targeted measures go beyond generic advice by focusing on the specific attack vector and user roles involved in this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-30T13:51:48.843Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69ba4605771bdb17494b99fe

Added to database: 3/18/2026, 6:28:21 AM

Last enriched: 3/18/2026, 6:43:30 AM

Last updated: 3/18/2026, 8:33:29 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses