CVE-2025-67972
Awaiting Analysis Awaiting Analysis - Queue
Reflected XSS in Prague Plugin ≀ 2.2.8 Allows Code Injection

Publication date: 2026-02-20

Last updated on: 2026-02-23

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fox-themes Prague prague-plugins allows Reflected XSS.This issue affects Prague: from n/a through <= 2.2.8.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-02-23
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fox-themes prague-plugins to 2.2.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-67972 is a medium severity Cross Site Scripting (XSS) vulnerability affecting the WordPress Prague Plugin versions up to and including 2.2.8.

This vulnerability allows an attacker to inject malicious scriptsβ€”such as redirects, advertisements, or other HTML payloadsβ€”that execute when site visitors access the compromised pages.

Exploitation requires user interaction by a privileged user, such as clicking a malicious link, visiting a crafted page, or submitting a form, although the initial action can be initiated by an unauthenticated user.


How can this vulnerability impact me? :

This vulnerability can lead to the execution of malicious scripts on your website, which can result in unauthorized redirects, display of unwanted advertisements, or other harmful HTML payloads.

Such exploitation can compromise the integrity and trustworthiness of your website, potentially harming your users and damaging your reputation.

Since exploitation requires interaction by a privileged user, attackers may trick administrators or other privileged users into triggering the malicious scripts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability is a Reflected Cross Site Scripting (XSS) issue in the WordPress Prague Plugin versions up to 2.2.8. Detection typically involves identifying malicious script injections in web page inputs or URLs that the plugin processes.'}, {'type': 'paragraph', 'content': 'While no specific commands are provided in the resources, common detection methods include using web vulnerability scanners that test for reflected XSS by injecting payloads into URL parameters or form inputs and observing if the payload is executed.'}, {'type': 'list_item', 'content': 'Use tools like OWASP ZAP or Burp Suite to scan the website for reflected XSS vulnerabilities.'}, {'type': 'list_item', 'content': "Manually test URL parameters or form inputs by injecting typical XSS payloads such as <script>alert('XSS')</script> and checking if the script executes."}, {'type': 'list_item', 'content': 'Check the plugin version installed on your WordPress site to see if it is 2.2.8 or earlier, which is vulnerable.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary and most effective mitigation step is to update the WordPress Prague Plugin to version 2.2.9 or later, where this vulnerability has been patched.

Until the update can be applied, users can implement mitigation rules provided by Patchstack to block attacks targeting this vulnerability.

  • Update the Prague Plugin to version 2.2.9 or later immediately.
  • Apply Patchstack mitigation rules or use their automatic update and vulnerability mitigation services if available.
  • Educate privileged users to avoid clicking on suspicious links or submitting untrusted forms that could trigger the XSS.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart