CVE-2025-68884
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-01-27

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arevico WP Simple Redirect wp-simple-redirect allows Reflected XSS.This issue affects WP Simple Redirect: from n/a through <= 1.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-01-27
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
arevico wp_simple_redirect to 1.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-68884 is a medium severity Cross Site Scripting (XSS) vulnerability in the WordPress WP Simple Redirect Plugin (versions up to 1.1). It allows an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, into a website. These scripts execute when visitors access the compromised site. Exploitation requires user interaction, like clicking a malicious link or visiting a crafted page, and no authentication is needed to initiate the attack. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute malicious scripts on your website, potentially redirecting visitors to harmful sites, displaying unwanted advertisements, or executing other harmful HTML payloads. This can lead to compromised user trust, potential data theft, or further exploitation of your website. Since no authentication is required, any visitor could be targeted if they interact with crafted content. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for suspicious HTTP requests containing malicious script payloads targeting the WP Simple Redirect plugin endpoints. Since the vulnerability is a reflected XSS, testing can be done by sending crafted requests with typical XSS payloads (e.g., <script>alert(1)</script>) to the plugin's URL parameters and observing if the payload is reflected unescaped in the response. Specific commands are not provided in the resources, but using tools like curl or Burp Suite to send such crafted requests can help detect the vulnerability. [1]


What immediate steps should I take to mitigate this vulnerability?

Since no official patch is available as of the publication date, immediate mitigation involves applying the Patchstack mitigation rule issued to block attacks targeting this vulnerability. Users are advised to implement this mitigation immediately to protect their websites until an official patch is released. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart