CM Business Directory – Optimise and showcase local business Vulner…

CM Business Directory – Optimise and showcase local business Vulner…

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2026-25004 is a Medium-severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the CM Business Directory – Optimise and showcase local business WordPress plugin (cm-business-directory) in versions up to and including 1.5.3.

The key requirement is that the attacker must already be authenticated in WordPress with Author-level permissions or higher. In many organizations, that includes marketing team members, content editors, contractors, and agencies—accounts that are commonly granted publishing capabilities to keep websites moving.

Once an attacker can place a malicious script into content handled by the plugin, the payload is stored and can execute later when a user visits the affected page—often without any additional clicks or obvious warning signs.

Security Weakness

This issue is caused by insufficient input sanitization and output escaping within the plugin’s handling of user-supplied content. In practical terms, the site may accept content that includes script-like instructions and then render it in a visitor’s browser in a way that allows it to run.

Because it’s a stored XSS vulnerability, the malicious code can persist on your site until discovered and removed, increasing the likelihood it will impact multiple stakeholders (customers, partners, employees) over time.

Reference: CVE-2026-25004 record.

Technical or Business Impacts

Stored XSS frequently becomes a business problem because it can undermine trust at the moment customers are researching, converting, or requesting contact. Depending on where the injected script appears, potential impacts include:

Account and session abuse: scripts can sometimes be used to perform actions in a user’s browser while they are logged in, increasing the risk of unauthorized changes or misuse of privileged sessions.

Brand and customer trust damage: injected content can deface pages, redirect visitors, or display fraudulent messages—highly visible failures that harm credibility and campaign performance.

Lead and revenue loss: compromised directory pages can break conversion paths, interfere with forms, skew attribution, or cause paid traffic to land on manipulated pages.

Compliance and reporting risk: if malicious scripts collect or expose data (even limited data), it may trigger internal incident response obligations, vendor/security questionnaires, or regulatory review depending on your environment.

Remediation: update CM Business Directory – Optimise and showcase local business to version 1.5.4 or newer (patched). In parallel, review which users have Author+ access, remove unused accounts, and consider tightening publishing permissions for third parties.

Similar Attacks

Stored XSS has a long history of causing real-world harm because it can spread through trusted pages and execute in visitors’ browsers:

The “Samy” MySpace worm (2005) used XSS to propagate rapidly across user profiles and demonstrated how quickly a script can spread through a popular platform.

The “Yamanner” worm (2006) leveraged XSS in webmail to send itself to contacts, showing how script injection can be weaponized for automated distribution and impersonation.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers