Pretty Url Vulnerability (Medium) – CVE-2025-22564

Pretty Url Vulnerability (Medium) – CVE-2025-22564

by | Feb 26, 2026 | Plugins

Attack Vectors

Pretty Url (slug: pretty-url) has a Medium-severity reflected cross-site scripting (XSS) vulnerability affecting versions up to and including 1.5.4 (CVE-2025-22564; CVSS 6.1). Reflected XSS typically works when an attacker sends a specially crafted URL or request that causes the site to “reflect” attacker-controlled content back to the user’s browser.

Because this issue can be triggered by an unauthenticated attacker, the most common delivery method is social engineering: phishing emails, chat messages, or ads that encourage a staff member, contractor, or customer to click a link. The CVSS vector indicates user interaction is required (a click or similar action), which is consistent with reflected XSS attacks.

For the official record, see CVE-2025-22564 and the write-up from the source: Wordfence vulnerability entry.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping. In practical terms, that means the plugin may accept certain user-supplied values and then display them back on a page without properly cleaning them or safely encoding them for the browser.

When that happens, a browser may interpret attacker-supplied content as active script rather than plain text. This is the core failure mode behind reflected XSS, and it can put users at risk even if they are simply viewing your site in a normal workflow.

Remediation: Update Pretty Url to version 1.5.5 or newer (patched). If you have change-control requirements, prioritize this update because the attack does not require a login and can be launched at scale.

Technical or Business Impacts

Reflected XSS can create immediate business risk because it targets people, not just servers. If an employee with access to WordPress, analytics, marketing tools, CRM, or other connected systems is tricked into clicking a malicious link, attackers may be able to run scripts in that user’s browser in the context of your site.

Potential outcomes include: account/session exposure (depending on how your environment is configured), unauthorized actions performed in the user’s session, and brand-damaging on-site behavior (unexpected pop-ups, redirects, form manipulation, or content changes presented to visitors). Even when the technical blast radius is limited, the reputational and compliance impact can be significant—especially for marketing-led web properties that handle lead capture, customer communications, or regulated data collection.

For leadership teams, the practical concern is operational: this type of issue can be used to undermine trust in your site and campaigns, increase the likelihood of credential theft through convincing in-browser prompts, and complicate incident response due to the human element (who clicked, when, and from where).

Similar Attacks

Reflected and stored XSS have been used in real-world incidents for years. Examples include:

The “Samy” MySpace worm, a well-known case where XSS was used to spread rapidly through a social platform.
The 2010 “Twitter worm” (onMouseOver XSS), which demonstrated how lightweight user interaction can trigger widespread, fast-moving impact.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers