Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25463: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WpEstate Wpresidence Core

0
Medium
VulnerabilityCVE-2026-25463cvecve-2026-25463
Published: Thu Feb 19 2026 (02/19/2026, 08:27:08 UTC)
Source: CVE Database V5
Vendor/Project: WpEstate
Product: Wpresidence Core

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WpEstate Wpresidence Core wpresidence-core allows Stored XSS.This issue affects Wpresidence Core: from n/a through <= 5.4.0.

AI-Powered Analysis

AILast updated: 02/19/2026, 09:14:52 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25463 affects the WpEstate Wpresidence Core WordPress plugin, specifically versions up to 5.4.0. It is a stored cross-site scripting (XSS) flaw caused by improper neutralization of user-supplied input during the generation of web pages. Stored XSS means that malicious scripts injected by an attacker are saved on the server and served to other users, which can lead to persistent exploitation. The vulnerability allows attackers to inject arbitrary JavaScript code that executes in the browsers of users who visit the compromised pages. This can result in session hijacking, theft of cookies or credentials, defacement, or redirection to malicious sites. The vulnerability was reserved and published in early 2026, but no CVSS score or public exploit is currently available. The affected product is widely used in real estate websites built on WordPress, a popular CMS platform. The lack of a patch link suggests that a fix may not yet be released, emphasizing the need for interim mitigations. The vulnerability requires no authentication to exploit and can affect any visitor to a vulnerable site, increasing its risk profile. The stored nature of the XSS makes it more dangerous than reflected XSS because the malicious payload persists and can affect multiple users over time.

Potential Impact

For European organizations, especially those operating real estate websites using the WpEstate Wpresidence Core plugin, this vulnerability poses a significant risk to user data confidentiality and site integrity. Attackers could leverage the stored XSS to steal session cookies, leading to account takeover or unauthorized access to sensitive user information. This could damage the organization's reputation, lead to regulatory penalties under GDPR due to data breaches, and result in financial losses. The availability of the site could also be indirectly impacted if attackers deface the website or redirect users to malicious content. Given the popularity of WordPress and real estate platforms in Europe, a successful exploitation could affect a broad user base, including customers and employees. The lack of a public exploit reduces immediate risk but does not eliminate it, as attackers may develop exploits once the vulnerability is widely known. The persistent nature of stored XSS means that even casual visitors could be compromised, increasing the scope of impact.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify the use of the WpEstate Wpresidence Core plugin and verify the version in use. Until an official patch is released, implement strict input validation and output encoding on all user-supplied data fields within the plugin, particularly those that generate web page content. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this plugin. Regularly monitor website content for unauthorized script injections and unusual behavior. Educate site administrators and developers about secure coding practices to prevent similar vulnerabilities. Once a patch is available, prioritize updating the plugin to the fixed version. Additionally, consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Conduct periodic security assessments and penetration testing focusing on XSS vulnerabilities. Finally, ensure incident response plans are in place to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-02T12:53:53.793Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996d0406aea4a407a4bdbeb

Added to database: 2/19/2026, 8:56:32 AM

Last enriched: 2/19/2026, 9:14:52 AM

Last updated: 2/20/2026, 9:03:07 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats