Video Share VOD – Turnkey Video Site Builder Script Vulnerability (…

Video Share VOD – Turnkey Video Site Builder Script Vulnerability (…

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2025-13727 is a Medium-severity Stored Cross-Site Scripting (XSS) issue in Video Share VOD – Turnkey Video Site Builder Script (slug: video-share-vod) affecting versions up to 2.7.11. The attacker must already be authenticated with Editor-level access or higher, which makes this a realistic risk in organizations with multiple content stakeholders, agencies, or distributed publishing teams.

The attack occurs through plugin settings/custom field meta values where input is not sufficiently sanitized and output is not properly escaped. Once a malicious script is stored, it can run automatically when someone views the affected page or area of the site—potentially impacting internal users (marketing, admin staff) and external visitors depending on where the injected content is displayed.

This vulnerability is specifically relevant for WordPress multisite environments and for installations where unfiltered_html has been disabled, which commonly aligns with more locked-down or compliance-oriented configurations.

Security Weakness

The root weakness is insufficient input sanitization and output escaping in plugin settings/custom field meta handling in Video Share VOD versions through 2.7.11. In business terms, this means the plugin may accept content that looks like normal configuration text but is later rendered in a way that the browser treats as active code.

The severity is Medium (CVSS 4.4), reflecting that the attacker needs elevated privileges and the attack conditions are narrower (multisite and/or unfiltered HTML restrictions). Even so, in many organizations Editor-level access is relatively common for publishing workflows, which can make the exposure meaningful.

Technical or Business Impacts

Stored XSS can translate into real business risk: unauthorized changes to what visitors see, manipulation of forms or calls-to-action, misleading redirects, and potential theft of session-related data depending on the viewing context. Because the script executes when a page is accessed, a single injection can repeatedly affect multiple stakeholders over time.

For marketing and executive teams, the key impacts are brand trust and campaign integrity. A compromised page can distort analytics, misroute paid traffic, or display unauthorized messaging—creating reputational damage and wasted spend. For compliance and finance functions, it can introduce policy violations and potential incident response costs, especially if the affected site is part of a regulated or audited web presence.

Recommended action: update Video Share VOD to version 2.7.12 or newer to remediate CVE-2025-13727, prioritizing any multisite installations and environments where unfiltered HTML is disabled.

Similar Attacks

Stored XSS is a common web application pattern and has been seen across major platforms and ecosystems. Examples of real-world issues include:

CISA Alert: Understanding Web Shells (context on post-exploitation web compromise often enabled by web app weaknesses)

PortSwigger Web Security Academy: Stored Cross-site Scripting (widely referenced educational resource describing how stored XSS is abused)

OWASP: Cross Site Scripting (XSS) (industry-standard overview of impacts and risk drivers)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers