CVE-2025-0805: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mlcalc Mortgage Calculator / Loan Calculator
CVE-2025-0805 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Mortgage Calculator / Loan Calculator' (mlcalc) affecting all versions up to 1. 5. 20. Authenticated users with contributor-level or higher privileges can inject malicious scripts via the plugin's shortcode attributes due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with a low attack complexity and no user interaction required. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-0805 affects the 'Mortgage Calculator / Loan Calculator' WordPress plugin (mlcalc) in all versions up to and including 1.5.20. It is a stored cross-site scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, the plugin fails to adequately sanitize and escape user-supplied attributes passed through its 'mlcalc' shortcode. This allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages or posts. When other users visit these pages, the injected scripts execute in their browsers under the context of the vulnerable site. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based with low complexity, requiring privileges of at least contributor level but no user interaction to trigger the payload. The scope is classified as changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses risks such as session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware through the affected WordPress sites.
Potential Impact
This vulnerability can significantly impact organizations using the mlcalc plugin on WordPress sites, especially those that allow contributor-level users to create or edit content. Exploitation can lead to unauthorized script execution in the browsers of site visitors or administrators, potentially resulting in session hijacking, credential theft, defacement, or distribution of malicious payloads. The integrity and confidentiality of user data can be compromised, and trust in the affected website may be damaged. Although the availability impact is minimal, the changed scope means that the vulnerability could affect multiple users and site components beyond the initial injection point. Organizations with public-facing WordPress sites that rely on this plugin are at risk of reputational damage and potential regulatory consequences if user data is compromised. The medium CVSS score suggests a moderate level of urgency, but the ease of exploitation by authenticated users elevates the threat in environments with multiple contributors.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for any official patches or updates from the plugin vendor and apply them promptly once available. In the absence of a patch, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling the mlcalc plugin if it is not critical. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious script injection attempts targeting the mlcalc shortcode parameters can provide interim protection. Additionally, site administrators should audit existing content for injected scripts and remove any suspicious code. Employing strict Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting the sources from which scripts can be loaded. Regular security training for contributors to recognize and avoid unsafe input practices is also recommended. Finally, monitoring logs for unusual activity related to shortcode usage can help detect exploitation attempts early.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Japan, Netherlands
CVE-2025-0805: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mlcalc Mortgage Calculator / Loan Calculator
Description
CVE-2025-0805 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Mortgage Calculator / Loan Calculator' (mlcalc) affecting all versions up to 1. 5. 20. Authenticated users with contributor-level or higher privileges can inject malicious scripts via the plugin's shortcode attributes due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with a low attack complexity and no user interaction required. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-0805 affects the 'Mortgage Calculator / Loan Calculator' WordPress plugin (mlcalc) in all versions up to and including 1.5.20. It is a stored cross-site scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, the plugin fails to adequately sanitize and escape user-supplied attributes passed through its 'mlcalc' shortcode. This allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages or posts. When other users visit these pages, the injected scripts execute in their browsers under the context of the vulnerable site. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based with low complexity, requiring privileges of at least contributor level but no user interaction to trigger the payload. The scope is classified as changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses risks such as session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware through the affected WordPress sites.
Potential Impact
This vulnerability can significantly impact organizations using the mlcalc plugin on WordPress sites, especially those that allow contributor-level users to create or edit content. Exploitation can lead to unauthorized script execution in the browsers of site visitors or administrators, potentially resulting in session hijacking, credential theft, defacement, or distribution of malicious payloads. The integrity and confidentiality of user data can be compromised, and trust in the affected website may be damaged. Although the availability impact is minimal, the changed scope means that the vulnerability could affect multiple users and site components beyond the initial injection point. Organizations with public-facing WordPress sites that rely on this plugin are at risk of reputational damage and potential regulatory consequences if user data is compromised. The medium CVSS score suggests a moderate level of urgency, but the ease of exploitation by authenticated users elevates the threat in environments with multiple contributors.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for any official patches or updates from the plugin vendor and apply them promptly once available. In the absence of a patch, administrators should restrict contributor-level access to trusted users only and consider temporarily disabling the mlcalc plugin if it is not critical. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious script injection attempts targeting the mlcalc shortcode parameters can provide interim protection. Additionally, site administrators should audit existing content for injected scripts and remove any suspicious code. Employing strict Content Security Policy (CSP) headers can help limit the impact of injected scripts by restricting the sources from which scripts can be loaded. Regular security training for contributors to recognize and avoid unsafe input practices is also recommended. Finally, monitoring logs for unusual activity related to shortcode usage can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-28T14:56:00.399Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b6bb7ef31ef0b5553a9
Added to database: 2/25/2026, 9:36:43 PM
Last enriched: 2/25/2026, 11:56:25 PM
Last updated: 2/26/2026, 9:42:21 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.