Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2017-2285: Cross-site scripting in SilkyPress Simple Custom CSS and JS

0
Medium
VulnerabilityCVE-2017-2285cvecve-2017-2285
Published: Wed Aug 02 2017 (08/02/2017, 16:00:00 UTC)
Source: CVE
Vendor/Project: SilkyPress
Product: Simple Custom CSS and JS

Description

Cross-site scripting vulnerability in Simple Custom CSS and JS prior to version 3.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

AI-Powered Analysis

AILast updated: 07/05/2025, 18:28:15 UTC

Technical Analysis

CVE-2017-2285 is a cross-site scripting (XSS) vulnerability identified in the WordPress plugin 'Simple Custom CSS and JS' developed by SilkyPress. This vulnerability affects all versions prior to 3.4. The flaw allows remote attackers to inject arbitrary web scripts or HTML code through unspecified vectors, which can be exploited when a user with appropriate privileges interacts with the maliciously crafted content. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.1 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No known exploits in the wild have been reported, and no official patch links are provided in the data, though upgrading to version 3.4 or later is implied to remediate the issue. The vulnerability enables attackers to execute malicious scripts in the context of the victim’s browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Since the plugin allows custom CSS and JS injection, improper sanitization of user input is the root cause, enabling injection of executable code.

Potential Impact

For European organizations using WordPress websites with the vulnerable 'Simple Custom CSS and JS' plugin, this vulnerability poses a risk of client-side attacks that can compromise user data confidentiality and integrity. Attackers could exploit this to steal session cookies, perform actions on behalf of users, or deliver malware. This is particularly concerning for organizations handling sensitive customer data, financial transactions, or personal information under GDPR regulations. The vulnerability could lead to reputational damage, regulatory fines, and loss of customer trust. Since the attack requires user interaction, phishing or social engineering campaigns could be used to lure users into triggering the exploit. The scope change indicates that the impact could extend beyond the plugin itself, potentially affecting other parts of the website or connected systems. Although no known exploits are reported, the medium severity and ease of exploitation without authentication make it a relevant threat. European organizations with public-facing WordPress sites using this plugin should consider this a moderate risk that requires prompt remediation to prevent exploitation.

Mitigation Recommendations

1. Immediate upgrade of the 'Simple Custom CSS and JS' plugin to version 3.4 or later, where the vulnerability is fixed. 2. If upgrading is not immediately possible, restrict access to the plugin’s functionality to trusted administrators only, minimizing exposure. 3. Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script sources. 4. Conduct thorough input validation and sanitization on any custom CSS or JS inputs, ensuring no executable scripts can be injected. 5. Monitor website logs and user activity for unusual behavior indicative of XSS exploitation attempts. 6. Educate users and administrators about phishing and social engineering risks that could trigger user interaction-based exploits. 7. Regularly scan WordPress sites with security tools that detect XSS vulnerabilities and plugin weaknesses. 8. Backup website data and configurations regularly to enable quick recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2016-12-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda625

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:28:15 PM

Last updated: 2/7/2026, 9:32:51 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats