Porto Theme – Functionality Vulnerability (Medium) – CVE-2025-63066

Porto Theme – Functionality Vulnerability (Medium) – CVE-2025-63066

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2025-63066 is a Medium-severity Stored Cross-Site Scripting (XSS) issue affecting the Porto Theme – Functionality WordPress plugin (slug: porto-functionality) in versions prior to 3.7.3.

The attack requires an authenticated WordPress account with at least Contributor permissions (or higher). An attacker with that level of access can insert malicious script content that becomes stored in your site and can execute later when a page containing the injected content is viewed.

Because this is a stored issue, it can impact multiple visitors over time—especially if the injected content is placed on high-traffic pages, landing pages, or content used in marketing campaigns.

Security Weakness

The underlying weakness is described as insufficient input sanitization and output escaping in Porto Theme – Functionality versions up to (but not including) 3.7.3. In practical terms, the plugin may allow certain content to be saved and later displayed in a way that can be interpreted by browsers as executable code.

The published severity metrics are CVSS 6.4 (Medium) with vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, indicating it is reachable over the network, requires low complexity, requires low privileges (Contributor+), and can affect other security boundaries (scope change).

Official CVE record: https://www.cve.org/CVERecord?id=CVE-2025-63066. Vulnerability source reference: Wordfence vulnerability database entry.

Technical or Business Impacts

Stored XSS vulnerabilities can create meaningful business risk even when the severity is “Medium,” because the impact depends heavily on who views the compromised pages (customers, executives, staff, partners) and what those pages are used for (lead gen, checkout flows, account portals, campaign landing pages).

Potential impacts include:

Brand and customer trust damage: Visitors may see unexpected pop-ups, redirects, or altered page content, harming credibility and conversion rates.

Session and account exposure risk: Malicious scripts can sometimes be used to capture actions taken in the browser or interfere with user sessions, especially for logged-in users such as site admins, editors, or marketing staff working in WordPress.

Marketing and revenue disruption: Injected scripts on landing pages or forms can reduce lead quality, break analytics/tagging, or redirect paid traffic—directly affecting CAC and pipeline attribution.

Compliance and reporting concerns: If malicious scripts impact customer data handling or authenticated user activity, compliance teams may need to assess whether internal reporting, customer notifications, or contractual obligations apply.

Recommended remediation: Update Porto Theme – Functionality to version 3.7.3 or newer (patched). After updating, review contributor and editor accounts, remove unused accounts, and audit recent content changes for unexpected scripts—especially on pages that receive paid traffic or contain forms.

Similar Attacks

Stored XSS has been used in real-world incidents to spread quickly and impact large numbers of users:

MySpace “Samy” worm (2005) — a classic stored XSS case that propagated across profiles at massive scale.

Twitter onMouseOver worm (2010) — an XSS-driven event that caused widespread automated posting and user impact.

While these examples occurred on major platforms, the business lesson applies to WordPress as well: when script injection becomes stored in a page template or frequently viewed content, the downstream impact can escalate quickly beyond the initial point of compromise.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers