Cyklodev WP Notify Vulnerability (Medium) – CVE-2022-44625

Cyklodev WP Notify Vulnerability (Medium) – CVE-2022-44625

by | Feb 25, 2026 | Plugins

Attack Vectors

Cyklodev WP Notify (slug: cyklodev-wp-notify) is affected by CVE-2022-44625, a Medium severity Stored Cross-Site Scripting (XSS) issue (CVSS 5.5). The attack requires an authenticated WordPress user with Admin (or higher) privileges, meaning it is most relevant when an administrator account is compromised (phishing, credential reuse, malware on an admin device) or when admin access is overly broad internally.

Because this is a stored XSS vulnerability, the injected script is saved in the site’s content/settings and can execute later when someone visits the affected page in the WordPress admin area or the public site (depending on where the payload is stored and rendered). Notably, the CVSS vector indicates no additional user interaction is required for the script to run once the page is accessed.

Reference: CVE-2022-44625 record.

Security Weakness

The underlying weakness is insufficient input sanitization and output escaping in Cyklodev WP Notify versions up to and including 1.2.1. This allows an admin-level attacker to store arbitrary script content via an unknown parameter and have it rendered later in a way that the browser executes as code.

From a governance perspective, “Admin+ required” does not eliminate risk: security incidents frequently start with compromised administrator accounts or excessive privileges granted to staff, vendors, or agencies. Stored XSS is also difficult to spot in routine reviews because it can be embedded in settings or content that looks legitimate at a glance.

Remediation guidance: update to Cyklodev WP Notify 1.3.0 or newer (patched). Source: Wordfence vulnerability advisory.

Technical or Business Impacts

If exploited, Stored XSS can lead to outcomes that matter directly to leadership teams:

Account and session risk: injected scripts may be used to abuse logged-in sessions, perform unauthorized actions in the background, or facilitate follow-on compromise (especially if other security controls are weak). While the CVSS score reflects “Low” confidentiality and integrity impact, real-world business impact can escalate depending on what the attacker targets and which users view the affected pages.

Brand and customer trust impact: malicious scripts can redirect visitors, alter on-page messaging, or inject scam content—damaging campaign performance, brand credibility, and customer confidence.

Compliance exposure: if the injected code is used to capture data entered into forms or interfere with user flows, it can create privacy and regulatory concerns (particularly for organizations subject to contractual security obligations, privacy regulations, or internal audit requirements).

Operational disruption: incident response commonly requires emergency patching, site content review/cleanup, credential resets, and potentially external forensics—pulling time and budget away from marketing and business operations.

Similar Attacks

Stored XSS has a long history of being used for large-scale abuse and reputational damage. A few well-known examples include:

The “Samy” MySpace worm (2005) — a stored XSS-driven worm that spread rapidly across user profiles.

The Twitter onMouseOver worm (2010) — an XSS issue that propagated through user interactions and caused widespread disruption.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers