Easy Table of Contents Vulnerability (Medium) – CVE-2025-13738

Easy Table of Contents Vulnerability (Medium) – CVE-2025-13738

by | Feb 18, 2026 | Plugins

Attack Vectors

Easy Table of Contents (slug: easy-table-of-contents) is affected by a Medium-severity stored cross-site scripting (XSS) vulnerability (CVE-2025-13738, CVSS 6.4) in versions up to and including 2.0.78. The issue is tied to the plugin’s ez-toc shortcode, where user-supplied attributes are not sufficiently sanitized and escaped.

The most important business-facing risk is that an authenticated user with Contributor-level access or higher can embed malicious script content into a page using the shortcode. That script can then run automatically when anyone views the affected page, including executives, customers, partners, or employees—without requiring them to click anything.

Security Weakness

The root weakness is insufficient input sanitization and output escaping for shortcode attributes in the Easy Table of Contents plugin. This allows stored content to be saved in the site database and later rendered in visitors’ browsers as active script, rather than safe text.

Because it is stored, the malicious content can persist across sessions and affect multiple visitors over time. This also means the impact is not limited to a single user account—anyone who can view the compromised page can be exposed.

Technical or Business Impacts

Stored XSS can be used to undermine trust and disrupt business operations. Depending on what is injected and who views it, outcomes can include: unauthorized actions taken in a logged-in user’s browser session, theft of information available in the browser context, defacement of high-visibility pages, manipulation of form submissions, or redirection to malicious content.

For marketing directors and business leaders, the largest risks often show up as brand damage (customers seeing tampered content), compliance exposure (security incidents involving user data or tracking), and revenue impact (lost conversions or campaigns paused during incident response). This vulnerability is rated Medium (CVSS 6.4), but it can still have outsized consequences when exploited on high-traffic landing pages or authenticated areas used by staff.

Remediation: update Easy Table of Contents to version 2.0.79 or a newer patched version. Track details under CVE-2025-13738 and the vendor advisory source at Wordfence Threat Intel.

Similar Attacks

Stored XSS is a common web application issue and has been widely exploited across platforms and plugins. For reference, here are a few real examples of XSS vulnerabilities and related incidents affecting widely used software:

CISA Known Exploited Vulnerabilities Catalog (includes multiple XSS cases)
CVE-2023-34362 (MOVEit Transfer; widely exploited campaign)
CVE-2021-44228 (Log4Shell; illustrates how “software component” flaws create broad business risk)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers