iONE360 configurator Vulnerability (High) – CVE-2025-15440

iONE360 configurator Vulnerability (High) – CVE-2025-15440

by | Feb 10, 2026 | Plugins

Attack Vectors

The WordPress plugin iONE360 configurator (slug: ione360-configurator) has a High severity vulnerability (CVSS 7.2, CVE-2025-15440) that can be exploited by unauthenticated attackers over the network. This means an attacker does not need a user account to attempt exploitation.

The reported attack path is through Contact Form parameters in the plugin. Because the issue is described as Stored Cross-Site Scripting (Stored XSS), an attacker can submit malicious content that may be saved by the site and later executed in a visitor’s browser when that injected content is viewed.

Security Weakness

According to the vulnerability report, iONE360 configurator versions up to and including 2.0.57 are vulnerable due to insufficient input sanitization and output escaping on Contact Form parameters. In business terms, the software may be accepting untrusted data and later displaying it in a way that browsers interpret as active code.

This is especially concerning for marketing and lead-generation workflows because contact forms often sit on high-traffic pages, are easy to reach, and are designed to accept free-form text—making them a practical target for abuse.

Technical or Business Impacts

A successful Stored XSS event can undermine trust in your brand and disrupt revenue-driving activities. When malicious scripts run in a customer’s browser, attackers may be able to alter page content, redirect visitors, or impersonate site interactions—potentially affecting campaign landing pages, product configurator experiences, and lead capture.

Potential business risks include damaged brand credibility, reduced conversion rates, increased customer support volume, and compliance concerns if malicious activity leads to exposure of user-related data. The CVSS vector indicates a cross-site impact scope change (S:C) with low complexity and no privileges required, which increases the urgency for leadership teams to treat this as a material website risk.

Remediation note: There is no known patch available per the source report. Organizations should review risk tolerance and consider mitigations such as uninstalling the affected plugin and replacing it, restricting or disabling exposed contact form functionality, increasing monitoring for suspicious submissions, and implementing defensive controls that reduce script injection impact.

Similar Attacks

Stored XSS has been widely used to compromise websites and user sessions. For context, here are a few well-known examples of web scripting attacks and related threat activity:

Imperva overview of Cross-Site Scripting (XSS) attacks

OWASP: Cross Site Scripting (XSS)

Cloudflare learning: What is XSS?

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers