CVE-2025-68856
Awaiting Analysis Awaiting Analysis - Queue
DOM-Based XSS in Mopinion Feedback Form

Publication date: 2026-02-20

Last updated on: 2026-02-23

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in keeswolters Mopinion Feedback Form mopinion-feedback-form allows DOM-Based XSS.This issue affects Mopinion Feedback Form: from n/a through <= 1.1.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-02-23
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
keeswolters mopinion_feedback_form From 1.1.1|end_including=1.1.1 (inc)
keeswolters mopinion_feedback_form to 1.1.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-68856 is a medium severity Cross Site Scripting (XSS) vulnerability affecting the WordPress Mopinion Feedback Form Plugin versions up to and including 1.1.1.

This vulnerability allows an attacker to inject malicious scriptsβ€”such as redirects, advertisements, or other HTML payloadsβ€”into a website, which execute when visitors access the compromised pages.

Exploitation requires user interaction by a privileged user, such as clicking a malicious link, visiting a crafted page, or submitting a form, although it can be exploited without authentication.

The issue is classified under the OWASP Top 10 category A1: Broken Access Control.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute malicious scripts on your website, which can lead to unauthorized redirects, display of unwanted advertisements, or other harmful HTML payloads.

Such exploitation can compromise the integrity and trustworthiness of your website, potentially harming your users and your reputation.

Since the vulnerability can be exploited without authentication but requires user interaction, attackers might trick privileged users into triggering the malicious payload.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a DOM-Based Cross-Site Scripting (XSS) issue in the Mopinion Feedback Form WordPress plugin up to version 1.1.1. Detection typically involves monitoring for suspicious script injections or unusual HTML payloads in web pages generated by the plugin.

Since the vulnerability allows injection of malicious scripts that execute when visitors access compromised pages, detection can include examining HTTP requests and responses for unexpected script tags or payloads.

Specific commands are not provided in the available resources, but common approaches include using web vulnerability scanners or manual inspection tools such as:

  • Using curl or wget to fetch pages generated by the Mopinion Feedback Form and inspecting the output for injected scripts.
  • Running automated scanners like OWASP ZAP or Burp Suite to detect reflected or DOM-based XSS vulnerabilities.
  • Monitoring web server logs for unusual query parameters or payloads that might trigger the XSS.

What immediate steps should I take to mitigate this vulnerability?

As of the publication date, no official patch is available for this vulnerability in the Mopinion Feedback Form plugin.

Patchstack has issued a mitigation rule to block attacks targeting this flaw, which users are strongly advised to apply promptly to protect their websites.

Immediate mitigation steps include:

  • Applying the Patchstack mitigation rule or automated protection services offered by Patchstack to block exploitation attempts.
  • Limiting user interaction with untrusted links or pages that might exploit the vulnerability.
  • Monitoring and restricting access to the affected plugin until an official fix is released.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart