CVE-2025-11241
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-06
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yoast | seo_premium | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-80 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Yoast SEO Premium plugin for WordPress versions 25.7 to 25.9. It occurs because of a flawed regular expression used to remove an attribute in post content, which can be exploited to inject arbitrary HTML attributes, including JavaScript event handlers. A user with Contributor access or higher can create a post containing malicious JavaScript code that will be stored and executed when viewed.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with Contributor or higher access to inject malicious JavaScript into posts, potentially leading to unauthorized actions such as stealing user data, hijacking user sessions, or performing actions on behalf of other users. It can compromise the integrity and security of the website and its users.