CVE-2025-69389
Reflected XSS in Visitor Maps Extended Referer Field
Publication date: 2026-02-20
Last updated on: 2026-02-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hugh_mungus | visitor_maps_extended_referer_field | to 1.2.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-69389 is a medium priority Cross Site Scripting (XSS) vulnerability affecting the WordPress Visitor Maps Extended Referer Field Plugin versions up to and including 1.2.6.
This vulnerability allows an attacker to inject malicious scriptsβsuch as redirects, advertisements, or other HTML payloadsβinto a website, which execute when visitors access the site.
Exploitation requires user interaction by a privileged user, such as clicking a malicious link, visiting a crafted page, or submitting a form, although no authentication is required to initiate the attack.
How can this vulnerability impact me? :
The vulnerability can lead to the execution of malicious scripts on your website, which can cause unwanted redirects, display of unauthorized advertisements, or other harmful HTML payloads.
This can compromise the integrity and trustworthiness of your website, potentially harming your users and damaging your reputation.
Since no authentication is required to exploit this vulnerability, attackers can easily target your site, increasing the risk of exploitation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is a reflected Cross Site Scripting (XSS) issue in the Visitor Maps Extended Referer Field WordPress plugin up to version 1.2.6. Detection typically involves monitoring for suspicious HTTP requests that include malicious script payloads in the referer field or URL parameters.
Since no official patch is available, detection can be aided by using web application firewalls or security tools that can log or block suspicious inputs resembling XSS payloads.
Specific commands are not provided in the available resources, but common approaches include using tools like curl or wget to test for reflected script injection by sending crafted requests and observing responses for script execution.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the mitigation rule issued by Patchstack to block attacks targeting this vulnerability until an official patch is released.
Using automated vulnerability mitigation services provided by Patchstack can help safeguard affected websites from exploitation.
Additionally, monitoring and restricting suspicious inputs, disabling or limiting the use of the vulnerable plugin, and educating users to avoid clicking on suspicious links can reduce risk.