CVE-2025-67991

High
|7.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to inject malicious scripts into web pages, which can then execute in the browsers of users visiting those pages, potentially stealing sensitive information like cookies or login credentials. It affects versions of the User Extra Fields plugin up to 16.8 and requires the attacker to trick users into clicking on a specially crafted link.

Technical Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vanquish User Extra Fields wp-user-extra-fields allows Reflected XSS.This issue affects User Extra Fields: from n/a through <= 16.8.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactLow
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,211($1K-$5K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 20, 2026

about 2 months ago

Last Modified

Feb 23, 2026

about 1 month ago