Etavrian
keyboard_arrow_right Created with Sketch.
News
keyboard_arrow_right Created with Sketch.

Ocean Extra XSS May Expose Up to 600,000 WordPress Sites - Are You Affected?

Reviewed:
Andrii Daniv
1
min read
Aug 30, 2025
Minimalist tech illustration showing code panel cracked shield plugin injection version update toggle

Security researchers disclosed an authenticated stored cross-site scripting vulnerability in the Ocean Extra WordPress plugin, which is listed as active on up to 600,000 sites. Sites running vulnerable versions should update to 2.5.0.

WordPress Ocean Extra vulnerability affects up to 600,000 sites

WordPress Ocean Extra Vulnerability Affects Up To 600,000 Sites
Stored XSS in Ocean Extra affects versions up to and including 2.4.9.

The flaw allows malicious scripts to be stored in site content and executed in users' browsers. It stems from insufficient input sanitization and output escaping in the oceanwp_library shortcode.

Exploitation requires an authenticated user with contributor-level access or higher to insert a payload via shortcode parameters. The payload persists in content and executes when a page or post is viewed.

Versions up to and including 2.4.9 are impacted. Version 2.5.0 is available and addresses the issue. Wordfence has published an advisory with technical details and recommended mitigation.

Key details

  • Affected plugin: Ocean Extra by OceanWP
  • Vulnerability type: authenticated stored cross-site scripting (XSS)
  • Attack vector: oceanwp_library shortcode parameters
  • Impacted versions: up to and including 2.4.9
  • Fixed version available: 2.5.0
  • Required permissions: contributor role or higher
  • Plugin purpose: companion plugin extending the OceanWP theme
  • Install base: up to 600,000 sites, per WordPress.org listing
  • Plugin slug: ocean-extra

Background

Ocean Extra extends the OceanWP theme with features like local font hosting, additional widgets, and navigation options. Its shortcode system lets users embed library items in content, but improper handling of shortcode attributes can enable script injection.

Stored XSS persists malicious payloads that execute in a viewer's browser. WordPress coding standards emphasize validating inputs and escaping outputs to prevent this risk. The contributor role can write posts but cannot publish them, while editors and administrators have broader capabilities. This vulnerability requires authenticated access consistent with those roles.

Source citations

Quickly summarize and get insighs with: 
Author
Etavrian AI
Etavrian AI is developed by Andrii Daniv to produce and optimize content for etavrian.com website.
Reviewed
Andrew Daniv, Andrii Daniv
Andrii Daniv
Andrii Daniv is the founder and owner of Etavrian, a performance-driven agency specializing in PPC and SEO services for B2B and e‑commerce businesses.
Quickly summarize and get insighs with: 
Table of contents