ListingPro Reviews Vulnerability (Medium) – CVE-2025-69051

ListingPro Reviews Vulnerability (Medium) – CVE-2025-69051

by | Feb 25, 2026 | Plugins

Attack Vectors

ListingPro Reviews (WordPress plugin slug: listingpro-reviews) versions below 2.9.11 are affected by a Medium-severity (CVSS 6.1) reflected cross-site scripting (XSS) issue tracked as CVE-2025-69051.

This vulnerability can be exploited remotely over the internet by an unauthenticated attacker, but it typically requires user interaction (for example, convincing a staff member, vendor, or customer to click a crafted link or submit a specific request). Because it is “reflected,” the malicious script is delivered via the request and executes in the victim’s browser when the affected page responds.

From a business-risk perspective, marketing and operations teams should assume the highest likelihood scenarios include targeted phishing-style links sent to employees with access to WordPress, analytics, forms, CRM tools, or customer support inboxes.

Security Weakness

The root cause is described as insufficient input sanitization and output escaping in ListingPro Reviews prior to version 2.9.11. In practical terms, the plugin does not consistently validate potentially unsafe input and/or does not safely render it back to the browser, which can allow attacker-supplied script content to be executed in a visitor’s session.

This is a common failure mode in web applications: even when a site is otherwise well managed, one plugin endpoint that reflects untrusted input can create a pathway for browser-based script execution under your brand’s domain.

Technical or Business Impacts

If exploited, reflected XSS can enable outcomes that matter to executives and compliance teams: manipulation of what users see on key pages, theft of session data in certain scenarios, unauthorized actions performed in the user’s browser, and increased success rates for phishing and social engineering. For marketing teams, this can directly impact lead integrity, campaign landing pages, and brand trust.

Because the vulnerability requires a user to be tricked into an action (such as clicking a link), the real-world risk often concentrates around employees who have higher-value access (WordPress admins/editors, marketing ops, support, finance), where a single successful click can lead to follow-on compromise attempts.

Remediation: Update ListingPro Reviews to version 2.9.11 or newer (patched). After updating, consider reviewing web logs for suspicious inbound links and reinforcing internal guidance on avoiding unexpected links related to site administration.

Reference: Wordfence advisory source: ListingPro Reviews – Reflected XSS.

Similar Attacks: Script-injection and XSS-style incidents have been used in high-profile breaches to undermine customer trust and capture sensitive data, including the British Airways web skimming case (ICO enforcement summary) and the Ticketmaster web skimming incident reported publicly (BBC coverage).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers