CVE-2025-0627: CWE-79 Cross-Site Scripting (XSS) in Unknown WordPress Tag, Category, and Taxonomy Manager
The WordPress Tag, Category, and Taxonomy Manager WordPress plugin before 3.30.0 does not sanitise and escape some of its Widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2025-0627 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress Tag, Category, and Taxonomy Manager plugin versions prior to 3.30.0. This plugin manages tags, categories, and taxonomies within WordPress sites. The vulnerability arises because the plugin fails to properly sanitize and escape certain widget settings, allowing malicious scripts to be stored and executed in the context of the WordPress admin interface. Notably, the vulnerability can be exploited by users with high privileges, such as administrators, even when the 'unfiltered_html' capability is disabled, which is a common restriction in multisite WordPress configurations to limit HTML input. The attack requires user interaction, specifically the admin user accessing the affected widget or page where the malicious payload is stored. Exploitation could lead to the execution of arbitrary JavaScript code within the admin session, potentially allowing attackers to hijack admin accounts, steal cookies or tokens, or perform actions on behalf of the admin. The CVSS v3.1 base score is 3.5, indicating a low severity level, reflecting the requirement for high privileges and user interaction, as well as the limited impact on confidentiality and integrity. There are no known exploits in the wild at the time of publication, and no official patches or updates have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations using WordPress sites with the Tag, Category, and Taxonomy Manager plugin, this vulnerability poses a risk primarily to site administrators and high-privilege users. If exploited, attackers could execute malicious scripts within the admin interface, potentially leading to session hijacking, unauthorized changes to site content or configuration, and exposure of sensitive administrative data. While the vulnerability requires admin-level access to exploit, it could be leveraged in scenarios where an attacker has already compromised a lower-privilege account or gained partial access, escalating their control. This risk is heightened in multisite WordPress deployments common in larger organizations, where the 'unfiltered_html' capability is often disabled to restrict content input, yet this vulnerability bypasses that safeguard. The impact on availability is minimal, but the integrity and confidentiality of administrative functions and data could be compromised. Given the widespread use of WordPress across European public sector, media, and commercial websites, exploitation could lead to defacement, data leakage, or further pivoting within organizational networks. However, the low CVSS score and lack of known exploits suggest the immediate risk is limited but should not be ignored.
Mitigation Recommendations
1. Immediate mitigation involves restricting plugin usage to trusted administrators only and auditing current admin accounts for suspicious activity. 2. Disable or remove the WordPress Tag, Category, and Taxonomy Manager plugin until a patched version (3.30.0 or later) is available and applied. 3. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting script execution sources. 4. Regularly monitor WordPress logs and admin activity for unusual behavior indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting widget settings. 6. Educate administrators on the risks of stored XSS and encourage cautious handling of widget configurations and inputs. 7. For multisite deployments, review and tighten user privilege assignments to minimize the number of high-privilege users. 8. Once a patch is released, prioritize testing and deployment in staging environments before production rollout to ensure compatibility and security.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-0627: CWE-79 Cross-Site Scripting (XSS) in Unknown WordPress Tag, Category, and Taxonomy Manager
Description
The WordPress Tag, Category, and Taxonomy Manager WordPress plugin before 3.30.0 does not sanitise and escape some of its Widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2025-0627 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress Tag, Category, and Taxonomy Manager plugin versions prior to 3.30.0. This plugin manages tags, categories, and taxonomies within WordPress sites. The vulnerability arises because the plugin fails to properly sanitize and escape certain widget settings, allowing malicious scripts to be stored and executed in the context of the WordPress admin interface. Notably, the vulnerability can be exploited by users with high privileges, such as administrators, even when the 'unfiltered_html' capability is disabled, which is a common restriction in multisite WordPress configurations to limit HTML input. The attack requires user interaction, specifically the admin user accessing the affected widget or page where the malicious payload is stored. Exploitation could lead to the execution of arbitrary JavaScript code within the admin session, potentially allowing attackers to hijack admin accounts, steal cookies or tokens, or perform actions on behalf of the admin. The CVSS v3.1 base score is 3.5, indicating a low severity level, reflecting the requirement for high privileges and user interaction, as well as the limited impact on confidentiality and integrity. There are no known exploits in the wild at the time of publication, and no official patches or updates have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations using WordPress sites with the Tag, Category, and Taxonomy Manager plugin, this vulnerability poses a risk primarily to site administrators and high-privilege users. If exploited, attackers could execute malicious scripts within the admin interface, potentially leading to session hijacking, unauthorized changes to site content or configuration, and exposure of sensitive administrative data. While the vulnerability requires admin-level access to exploit, it could be leveraged in scenarios where an attacker has already compromised a lower-privilege account or gained partial access, escalating their control. This risk is heightened in multisite WordPress deployments common in larger organizations, where the 'unfiltered_html' capability is often disabled to restrict content input, yet this vulnerability bypasses that safeguard. The impact on availability is minimal, but the integrity and confidentiality of administrative functions and data could be compromised. Given the widespread use of WordPress across European public sector, media, and commercial websites, exploitation could lead to defacement, data leakage, or further pivoting within organizational networks. However, the low CVSS score and lack of known exploits suggest the immediate risk is limited but should not be ignored.
Mitigation Recommendations
1. Immediate mitigation involves restricting plugin usage to trusted administrators only and auditing current admin accounts for suspicious activity. 2. Disable or remove the WordPress Tag, Category, and Taxonomy Manager plugin until a patched version (3.30.0 or later) is available and applied. 3. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads by restricting script execution sources. 4. Regularly monitor WordPress logs and admin activity for unusual behavior indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting widget settings. 6. Educate administrators on the risks of stored XSS and encourage cautious handling of widget configurations and inputs. 7. For multisite deployments, review and tighten user privilege assignments to minimize the number of high-privilege users. 8. Once a patch is released, prioritize testing and deployment in staging environments before production rollout to ensure compatibility and security.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-01-21T19:08:04.546Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef687
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 8:21:02 PM
Last updated: 7/28/2025, 9:37:17 PM
Views: 14
Related Threats
CVE-2025-8967: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-54867: CWE-61: UNIX Symbolic Link (Symlink) Following in youki-dev youki
HighCVE-2025-8966: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8965: Unrestricted Upload in linlinjava litemall
MediumCVE-2025-36047: CWE-770 Allocation of Resources Without Limits or Throttling in IBM WebSphere Application Server Liberty
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.