CVE-2025-66092: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bqworks Accordion Slider
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bqworks Accordion Slider accordion-slider allows Stored XSS.This issue affects Accordion Slider: from n/a through <= 1.9.13.
AI Analysis
Technical Summary
CVE-2025-66092 is a stored Cross-site Scripting (XSS) vulnerability found in the bqworks Accordion Slider plugin, a tool commonly used to create accordion-style content sliders on websites. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious scripts to be stored and later executed in the context of users visiting the affected site. This flaw affects all versions of the Accordion Slider plugin up to and including version 1.9.13. The vulnerability requires an attacker to have some level of privileges (PR:L) and user interaction (UI:R) to be exploited, indicating that the attacker must be able to submit content that is then viewed by other users. The CVSS v3.1 base score is 6.5, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), partial confidentiality, integrity, and availability impacts (C:L/I:L/A:L), and scope change (S:C). Although no known exploits have been reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites if exploited. The vulnerability is particularly relevant for websites using the Accordion Slider plugin, which is often deployed on WordPress-based sites. Given the nature of stored XSS, the impact can extend to all users who view the compromised content, potentially leading to broader compromise of user accounts and sensitive data. The lack of available patches at the time of publication necessitates immediate attention to input validation and monitoring.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution within users' browsers, resulting in session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of legitimate users. This can damage organizational reputation, lead to data breaches, and disrupt service availability. Organizations relying on WordPress websites with the Accordion Slider plugin are particularly vulnerable. The scope of impact includes web portals, intranets, and customer-facing websites, potentially affecting both internal users and external customers. Given the medium severity, the risk is moderate but can escalate if combined with other vulnerabilities or social engineering attacks. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially in environments with multiple contributors or less stringent access controls. Additionally, the scope change indicates that exploitation can affect components beyond the initially vulnerable plugin, potentially compromising broader application functionality.
Mitigation Recommendations
1. Monitor official bqworks and WordPress plugin repositories for patches addressing CVE-2025-66092 and apply updates promptly once available. 2. Implement strict input validation and output encoding on all user-supplied data, especially content submitted through the Accordion Slider interface. 3. Restrict plugin usage to trusted users with minimal necessary privileges to reduce the risk of malicious content submission. 4. Deploy Web Application Firewalls (WAFs) configured to detect and block common XSS payloads targeting the Accordion Slider plugin. 5. Conduct regular security audits and code reviews focusing on input handling in customizations involving the plugin. 6. Educate content contributors about the risks of injecting untrusted content and enforce content moderation policies. 7. Where feasible, consider replacing the Accordion Slider plugin with alternative, actively maintained plugins with better security track records. 8. Monitor web server and application logs for unusual activities indicative of attempted XSS exploitation. 9. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-66092: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bqworks Accordion Slider
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bqworks Accordion Slider accordion-slider allows Stored XSS.This issue affects Accordion Slider: from n/a through <= 1.9.13.
AI-Powered Analysis
Technical Analysis
CVE-2025-66092 is a stored Cross-site Scripting (XSS) vulnerability found in the bqworks Accordion Slider plugin, a tool commonly used to create accordion-style content sliders on websites. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious scripts to be stored and later executed in the context of users visiting the affected site. This flaw affects all versions of the Accordion Slider plugin up to and including version 1.9.13. The vulnerability requires an attacker to have some level of privileges (PR:L) and user interaction (UI:R) to be exploited, indicating that the attacker must be able to submit content that is then viewed by other users. The CVSS v3.1 base score is 6.5, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), partial confidentiality, integrity, and availability impacts (C:L/I:L/A:L), and scope change (S:C). Although no known exploits have been reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites if exploited. The vulnerability is particularly relevant for websites using the Accordion Slider plugin, which is often deployed on WordPress-based sites. Given the nature of stored XSS, the impact can extend to all users who view the compromised content, potentially leading to broader compromise of user accounts and sensitive data. The lack of available patches at the time of publication necessitates immediate attention to input validation and monitoring.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution within users' browsers, resulting in session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of legitimate users. This can damage organizational reputation, lead to data breaches, and disrupt service availability. Organizations relying on WordPress websites with the Accordion Slider plugin are particularly vulnerable. The scope of impact includes web portals, intranets, and customer-facing websites, potentially affecting both internal users and external customers. Given the medium severity, the risk is moderate but can escalate if combined with other vulnerabilities or social engineering attacks. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially in environments with multiple contributors or less stringent access controls. Additionally, the scope change indicates that exploitation can affect components beyond the initially vulnerable plugin, potentially compromising broader application functionality.
Mitigation Recommendations
1. Monitor official bqworks and WordPress plugin repositories for patches addressing CVE-2025-66092 and apply updates promptly once available. 2. Implement strict input validation and output encoding on all user-supplied data, especially content submitted through the Accordion Slider interface. 3. Restrict plugin usage to trusted users with minimal necessary privileges to reduce the risk of malicious content submission. 4. Deploy Web Application Firewalls (WAFs) configured to detect and block common XSS payloads targeting the Accordion Slider plugin. 5. Conduct regular security audits and code reviews focusing on input handling in customizations involving the plugin. 6. Educate content contributors about the risks of injecting untrusted content and enforce content moderation policies. 7. Where feasible, consider replacing the Accordion Slider plugin with alternative, actively maintained plugins with better security track records. 8. Monitor web server and application logs for unusual activities indicative of attempted XSS exploitation. 9. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:21:04.795Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69205c31c36be036e6ff275e
Added to database: 11/21/2025, 12:33:53 PM
Last enriched: 11/28/2025, 10:26:09 PM
Last updated: 1/7/2026, 5:23:17 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.