CVE-2025-59549
BaseFortify
Publication date: 2025-09-22
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| getresponse | getresponse_forms | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the WordPress GetResponse Forms Plugin up to version 2.6.0. It allows attackers with Contributor-level privileges to inject malicious scriptsβsuch as redirects, advertisements, or other HTML payloadsβinto websites using the plugin. These scripts execute when visitors access the affected site, potentially compromising user interactions. [1]
How can this vulnerability impact me? :
The vulnerability can lead to attackers injecting malicious scripts that execute in the browsers of site visitors. This can result in unwanted redirects, display of unauthorized advertisements, theft of user data, or other malicious actions. Although the severity is considered low (CVSS 6.5), exploitation can harm website visitors and damage the website's reputation. It requires a Contributor-level privilege to exploit, and patching to version 2.6.1 or later is recommended to prevent attacks. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves scanning for the presence of the vulnerable GetResponse Forms plugin version 2.6.0 or earlier on your WordPress site. Additionally, monitoring for suspicious script injections or unexpected HTML payloads in web pages generated by the plugin can indicate exploitation attempts. While no specific commands are provided, using WordPress plugin version checks and server-side malware scanning tools is recommended to identify compromise. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the GetResponse Forms plugin to version 2.6.1 or later, which contains the fix for this vulnerability. If updating immediately is not possible, applying virtual patching (vPatching) offered by Patchstack can help auto-mitigate the vulnerability. Additionally, restricting contributor-level privileges and performing professional incident response and server-side malware scanning if compromise is suspected are recommended. [1]