CVE-2025-14127
Reflected XSS in Testimonial Master WordPress Plugin
Publication date: 2026-01-07
Last updated on: 2026-01-07
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| padlabs | testimonial_master | to 0.2.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Reflected Cross-Site Scripting (XSS) issue in the Testimonial Master plugin for WordPress. It occurs because the plugin does not properly sanitize or escape the $_SERVER['PHP_SELF'] variable, allowing attackers to inject malicious scripts. These scripts can run when a user is tricked into clicking a crafted link, potentially compromising the user's interaction with the website.
How can this vulnerability impact me? :
The vulnerability can allow unauthenticated attackers to execute arbitrary web scripts in the context of the affected website. This can lead to theft of user data, session hijacking, or other malicious actions performed on behalf of the user, especially if the user is tricked into clicking a malicious link.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling or uninstalling the Testimonial Master plugin if it is installed, especially since it has been closed and is unavailable for download pending review. Additionally, avoid clicking on suspicious links that may exploit the reflected XSS vulnerability. Monitor and restrict user input that may be reflected via the PHP_SELF variable. Consider applying web application firewall (WAF) rules to block malicious requests targeting this vulnerability. [1]