CVE-2025-52782
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-20

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in King Rayhan Scroll UP scroll-to-up allows Reflected XSS.This issue affects Scroll UP: from n/a through <= 2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-20
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross Site Scripting (XSS) issue in the WordPress Scroll UP plugin (versions up to 2.0). It allows unauthenticated attackers to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, into websites using the plugin. These scripts execute when visitors access the compromised site, potentially causing various malicious effects depending on the context. [1]


How can this vulnerability impact me? :

The vulnerability can lead to attackers injecting malicious scripts that execute in the browsers of site visitors. This can result in unwanted redirects, display of malicious advertisements, theft of user data, session hijacking, or other harmful actions. Since the plugin is abandoned and unpatched, the risk of exploitation is higher, and deactivating the plugin alone does not fully mitigate the risk without additional virtual patching or removal. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking if the WordPress site is using the Scroll UP plugin version 2.0 or earlier. Since the vulnerability allows injection of malicious scripts, monitoring HTTP requests and responses for suspicious script injections or unexpected redirects can help. Additionally, server-side malware scanning is recommended because plugin-based scanners may be unreliable due to tampering. Specific commands are not provided in the resources, but general approaches include using web vulnerability scanners or inspecting HTTP traffic with tools like curl or browser developer tools to identify reflected XSS payloads. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing and replacing the vulnerable Scroll UP plugin with a secure alternative, as no official patch or update is available due to the plugin being abandoned. Applying a virtual patch (vPatch) provided by Patchstack can also rapidly protect against exploitation without requiring an official fix. If the site is already compromised, professional incident response and server-side malware scanning are recommended to address any infections. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart