Premmerce User Roles Vulnerability (Medium) – CVE-2025-64291

Premmerce User Roles Vulnerability (Medium) – CVE-2025-64291

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-64291 is a Medium-severity Stored Cross-Site Scripting (XSS) issue in the Premmerce User Roles WordPress plugin (slug: premmerce-user-roles) affecting versions up to and including 1.0.13 (CVSS 3.1: 4.4, vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N).

The attack requires an authenticated user with administrator-level access (or higher) to inject script content that is then stored and executed when someone views the affected page(s). While this is not a “drive-by” anonymous attack, it is still a meaningful risk for organizations that must plan for compromised admin accounts, malicious insiders, or third-party agencies with elevated access.

This vulnerability is specifically relevant to WordPress multi-site environments and to installations where unfiltered_html has been disabled, which commonly appears in more locked-down or compliance-driven configurations.

Security Weakness

The underlying issue is insufficient input sanitization and output escaping in Premmerce User Roles (through version 1.0.13). In practice, this can allow stored script payloads to be saved in the WordPress database and later rendered in an admin or site context.

Because this is a Stored XSS, it can have a longer “shelf life” than reflected XSS: once injected, the script can execute repeatedly for any user who loads the affected page, until it is removed and the vulnerable software is patched.

Technical or Business Impacts

Stored XSS can create both operational and reputational risk, especially when it executes in trusted administrative contexts. Depending on where the script renders and who views it, potential outcomes include unauthorized changes to site content, tampering with on-page messaging, and misdirection of visitors (for example, via injected redirects or modified calls-to-action).

From a business perspective, this can impact:

  • Brand trust: visitors seeing unexpected pop-ups, defacements, or altered marketing pages.
  • Lead integrity: form interactions and landing-page flows could be manipulated, reducing conversion performance or sending prospects to unintended destinations.
  • Compliance and audit posture: multi-site setups are common in larger organizations; repeated script execution in administrative views can complicate incident response and reporting.

Remediation: Update Premmerce User Roles to version 1.0.14 or a newer patched version. You can reference the CVE record here: https://www.cve.org/CVERecord?id=CVE-2025-64291. For organizational risk reduction, also review who has administrator access across the network, and ensure agency/vendor accounts follow least-privilege and MFA policies.

Similar Attacks

Stored XSS in WordPress plugins is a recurring pattern, often stemming from missing sanitization/escaping in admin-facing features. One real example is CVE-2021-25046 (a Stored XSS issue affecting the WP Statistics plugin): https://www.cve.org/CVERecord?id=CVE-2021-25046.

These incidents reinforce a practical lesson for marketing and business leaders: even when an exploit requires elevated access, vulnerabilities can still be triggered after account takeover, and the resulting impact often shows up first as website integrity and conversion-performance disruption.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers