Get Use APIs – JSON Content Importer Vulnerability (Medium) – CVE-2…

Get Use APIs – JSON Content Importer Vulnerability (Medium) – CVE-2…

by | Mar 19, 2026 | Plugins

Attack Vectors

CVE-2025-15363 is a Medium-severity Stored Cross-Site Scripting (XSS) issue (CVSS 6.4) affecting Get Use APIs – JSON Content Importer (slug: json-content-importer) in versions prior to 2.0.10.

The attack requires an authenticated WordPress account with Contributor-level access or higher. In practical terms, this increases risk for organizations that work with multiple authors, external agencies, freelancers, or any environment where accounts are frequently created and permissioned.

Once a malicious script is injected into content managed through the plugin, it can execute automatically when a user visits the affected page—without requiring the visitor to click anything.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping. This means untrusted content can be stored and later rendered in a way that allows browser-executed scripts to run in a trusted site context.

Because the issue is stored XSS, the payload can persist in your site content and repeatedly impact staff and visitors until removed and the plugin is updated.

Reference: CVE record (CVE-2025-15363) and Wordfence advisory.

Technical or Business Impacts

If exploited, this vulnerability can enable actions such as session hijacking (stealing logged-in cookies), unauthorized changes to site content, and malicious redirects—all of which can directly affect brand trust and revenue. It may also be used to silently alter marketing pages, tracking tags, or calls-to-action, undermining campaign performance and reporting integrity.

For leadership and compliance stakeholders, the business impact often shows up as reputational damage, potential data exposure (depending on what users can access in the browser session), and added costs from incident response, emergency site cleanup, and downtime for marketing teams.

Remediation: Update Get Use APIs – JSON Content Importer to version 2.0.10 or a newer patched version. As a risk-reduction step, also review who has Contributor (or higher) access and remove or restrict accounts that are no longer needed.

Similar Attacks

Stored XSS has been used in real-world incidents to spread quickly and impact large numbers of users through normal page views. Examples include the Samy worm on MySpace and the 2010 Twitter onMouseover worm, both of which demonstrated how stored scripts in trusted content can scale into broad reputational and operational harm.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers