Filestack Vulnerability (Medium) – CVE-2025-13959

Filestack Vulnerability (Medium) – CVE-2025-13959

by | Feb 17, 2026 | Plugins

Attack Vectors

Filestack (WordPress plugin slug: filepicker-media-uploader) versions up to and including 2.0.8 are affected by CVE-2025-13959, a Medium-severity stored cross-site scripting (XSS) issue (CVSS 6.4). The reported entry point is the plugin’s filepicker shortcode, where user-supplied shortcode attributes are not adequately sanitized or safely rendered.

The risk scenario most relevant to business teams is an authenticated user with Contributor-level access or higher inserting a malicious payload into a post or page using that shortcode. Because this is a stored issue, the injected script can run later for anyone who visits the compromised content—often including executives, finance, marketing admins, and site administrators.

In practical terms, this may be exploited through normal content workflows (drafts, approvals, publishing, or editing) where Contributor+ accounts are commonly used by internal staff, agencies, freelancers, or partners. If any of those accounts are compromised, the attacker may be able to use this vulnerability to plant a persistent script on high-traffic pages.

Security Weakness

The underlying weakness is insufficient input sanitization and output escaping for attributes provided to the Filestack plugin’s filepicker shortcode. When a plugin accepts user-controlled text and then outputs it into a page without properly handling it, it can allow browsers to interpret that content as executable script.

This vulnerability requires authenticated access (Contributor+), but it does not require a victim to click a link or take a special action beyond viewing the affected page. From a governance standpoint, that matters because “authenticated” does not always mean “trusted”: many organizations intentionally grant Contributor access to enable marketing content velocity.

According to the disclosed details, there is no known patch available at this time. That elevates decision pressure for marketing and business stakeholders because risk reduction may require operational mitigations (access policy changes, plugin removal, or replacement) rather than a simple update cycle.

Technical or Business Impacts

Stored XSS can translate directly into business risk. If exploited on a customer-facing site, it can undermine brand trust by displaying unexpected content, redirecting visitors, or injecting deceptive forms that look legitimate. For marketing teams, this can corrupt campaign landing pages, impair attribution, and reduce conversion rates—often before anyone notices.

For executives and finance teams, the larger risk is that a malicious script can be used to steal session data, perform actions as a logged-in user, or capture sensitive information entered into the site. That can lead to unauthorized content changes, account takeover of privileged users, and exposure of limited but meaningful data—triggering incident response costs, downtime, and reputational harm.

Compliance and legal stakeholders should consider that a persistent script on production pages may be viewed as a breach of integrity controls, especially if it enables user tracking, form interception, or unauthorized changes to notices and disclosures. Even if the technical impact is “limited,” the operational impact can include emergency site freezes, re-approval of published content, and notification obligations depending on what data is exposed.

Recommended actions (given no known patch): assess whether Filestack (filepicker-media-uploader) is essential; if not, consider uninstalling and replacing it based on your organization’s risk tolerance. Tighten who can create or edit content that uses shortcodes, audit posts/pages for the filepicker shortcode, and review Contributor+ accounts (including third parties) for least-privilege access and strong authentication.

Similar Attacks

Stored XSS in widely deployed web and CMS components is a common path to brand damage and account compromise. Real-world examples include:

British Airways Magecart-style website compromise (example of client-side script injection risks)

Magecart attacks overview (common impacts: data theft and trust loss via injected scripts)

WordPress 4.7.1 security release (historical example of content-related vulnerabilities requiring rapid action)

Reference: CVE-2025-13959 (CVE record) and Wordfence vulnerability report (source).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers