GZSEO Vulnerability (Medium) – CVE-2025-14941

GZSEO Vulnerability (Medium) – CVE-2025-14941

by | Feb 24, 2026 | Plugins

Attack Vectors

GZSEO (slug: gzseo) versions 2.0.11 and earlier have a Medium severity vulnerability (CVSS 6.4, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) tracked as CVE-2025-14941.

The attack requires an authenticated WordPress account with Contributor-level access or higher. In practice, that can include internal users, contractors, agencies, or any account that becomes compromised through password reuse, phishing, or credential stuffing.

An attacker can inject malicious content into posts via the plugin’s functionality, resulting in stored cross-site scripting (Stored XSS) that runs when someone views the affected page—potentially including editors, administrators, and site visitors.

Security Weakness

This issue is caused by a combination of missing capability checks on multiple AJAX handlers (an authorization bypass) and insufficient input sanitization/output escaping for the embed_code parameter. Together, these weaknesses can allow a Contributor (or higher) to store injected content where it should not be permitted.

Because the content is stored in the site and executes on page load, it can be difficult to spot in day-to-day content workflows—especially on sites with many authors, frequent publishing, or multiple teams with access.

Technical or Business Impacts

Brand and customer trust risk: Stored XSS can be used to display unwanted content, misleading calls-to-action, or redirect-like behavior on legitimate pages—damaging credibility and conversion performance.

Account and admin session risk: If malicious code executes when an administrator or editor views an affected post, it can be used to attempt actions in the context of that logged-in user (depending on what the injected content does and what protections are in place).

Compliance and legal exposure: Even though this is rated Medium severity, it can still contribute to privacy and compliance concerns if it enables unauthorized content injection on pages that collect leads, run analytics tags, or present regulated disclosures.

Operational disruption: Identifying and cleaning injected content across multiple posts can consume marketing and web team time, delay campaigns, and create uncertainty around content integrity.

Recommended remediation: Update GZSEO to version 2.0.12 or a newer patched release. In addition, review who has Contributor (and above) access, audit recent content changes for unexpected embedded code, and consider temporary tightening of publishing permissions until the update is confirmed deployed.

Similar Attacks

Stored XSS has been used in real-world incidents to spread rapidly and impact trusted web experiences. Examples include:

The “Samy” MySpace worm (Stored XSS), which propagated through user profiles and demonstrated how quickly a trusted platform can be leveraged to spread malicious code.

TweetDeck XSS worm (2014), where malicious scripts spread via a social platform’s interface, highlighting the reputational and operational impact of script injection issues.

The Yamanner Yahoo! Mail worm (XSS), an example of how script injection can be used to automate unwanted actions and accelerate propagation through trusted communication channels.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers