Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0805: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mlcalc Mortgage Calculator / Loan Calculator

0
Medium
VulnerabilityCVE-2025-0805cvecve-2025-0805cwe-79
Published: Tue Feb 18 2025 (02/18/2025, 04:21:11 UTC)
Source: CVE Database V5
Vendor/Project: mlcalc
Product: Mortgage Calculator / Loan Calculator

Description

CVE-2025-0805 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Mortgage Calculator / Loan Calculator' (mlcalc) affecting all versions up to 1. 5. 20. Authenticated users with contributor-level or higher privileges can inject malicious scripts via the plugin's shortcode attributes due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with a low attack complexity and no user interaction required. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:56:25 UTC

Technical Analysis

The vulnerability identified as CVE-2025-0805 affects the 'Mortgage Calculator / Loan Calculator' WordPress plugin (mlcalc) in all versions up to and including 1.5.20. It is a stored cross-site scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, the plugin fails to adequately sanitize and escape user-supplied attributes passed through its 'mlcalc' shortcode. This allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages or posts. When other users visit these pages, the injected scripts execute in their browsers under the context of the vulnerable site. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based with low complexity, requiring privileges of at least contributor level but no user interaction to trigger the payload. The scope is classified as changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses risks such as session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware through the affected WordPress sites.

Potential Impact

This vulnerability can significantly impact organizations using the mlcalc plugin on WordPress sites, especially those that allow contributor-level users to create or edit content. Exploitation can lead to unauthorized script execution in the browsers of site visitors or administrators, potentially resulting in session hijacking, credential theft, defacement, or distribution of malicious payloads. The integrity and confidentiality of user data can be compromised, and trust in the affected website may be damaged. Although the availability impact is minimal, the changed scope means that the vulnerability could affect multiple users and site components beyond the initial injection point. Organizations with public-facing WordPress sites that rely on this plugin are at risk of reputational damage and potential regulatory consequences if user data is compromised. The medium CVSS score suggests a moderate level of urgency, but the ease of exploitation by authenticated users elevates the threat in environments with multiple contributors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for any official patches or updates from the plugin vendor and apply them promptly once available. In the absence of a patch, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling the mlcalc plugin if it is not critical. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious script injection attempts targeting the mlcalc shortcode parameters can provide interim protection. Additionally, site administrators should audit existing content for injected scripts and remove any suspicious code. Employing strict Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting the sources from which scripts can be loaded. Regular security training for contributors to recognize and avoid unsafe input practices is also recommended. Finally, monitoring logs for unusual activity related to shortcode usage can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-28T14:56:00.399Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6bb7ef31ef0b5553a9

Added to database: 2/25/2026, 9:36:43 PM

Last enriched: 2/25/2026, 11:56:25 PM

Last updated: 2/26/2026, 9:42:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats