CVE-2025-0897: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpcalc Modal Window – create popup modal window
CVE-2025-0897 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Modal Window – create popup modal window' by wpcalc, affecting all versions up to 6. 1. 5. The flaw arises from insufficient sanitization and escaping of user input in the 'iframeBox' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. Exploitation requires authentication but no user interaction beyond visiting the affected page. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent exploitation. The threat primarily targets websites that allow contributor-level user roles and use this specific plugin, which is popular among WordPress users globally.
AI Analysis
Technical Summary
CVE-2025-0897 is a stored Cross-Site Scripting vulnerability classified under CWE-79, found in the 'Modal Window – create popup modal window' WordPress plugin developed by wpcalc. This plugin enables site administrators to create popup modal windows using shortcodes, including 'iframeBox'. The vulnerability exists due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of user-supplied attributes within the 'iframeBox' shortcode. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts. Because the malicious script is stored persistently, it executes in the context of any user who views the infected page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability affects all plugin versions up to and including 6.1.5. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites that use this plugin and allow contributor-level access to untrusted users. The lack of patches at the time of disclosure necessitates immediate mitigation steps.
Potential Impact
The impact of CVE-2025-0897 is primarily on the confidentiality and integrity of affected WordPress sites. Successful exploitation allows an authenticated contributor or higher to inject persistent malicious scripts that execute in the browsers of site visitors and administrators. This can lead to theft of session cookies, enabling account takeover, unauthorized actions performed on behalf of users, defacement, or distribution of malware. Since the vulnerability requires contributor-level access, the threat is elevated in environments where contributor roles are granted to less trusted users or where account compromise is possible. The scope change in the CVSS vector indicates that the attack can affect resources beyond the initially compromised component, potentially impacting the entire site or user base. Although availability is not directly affected, the reputational damage and potential data breaches can be severe. Organizations running WordPress sites with this plugin, especially those with multiple contributors or public-facing content, face increased risk of targeted attacks and exploitation by malicious insiders or external attackers who have gained contributor credentials.
Mitigation Recommendations
1. Immediate mitigation involves restricting contributor-level access to trusted users only and auditing existing contributor accounts for suspicious activity. 2. Disable or remove the 'Modal Window – create popup modal window' plugin until a security patch is released. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'iframeBox' shortcode parameters. 4. Sanitize and validate all user inputs rigorously, especially those that can be embedded in shortcodes or HTML attributes. 5. Monitor logs for unusual script injections or changes to pages containing modal windows. 6. Educate content contributors about safe content practices and the risks of injecting untrusted code. 7. Once available, promptly apply official security patches from the plugin vendor. 8. Consider employing Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected sites. 9. Regularly back up site content and configurations to enable recovery if exploitation occurs. 10. Conduct periodic security assessments focusing on plugin vulnerabilities and user privilege management.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, Brazil, France, Japan, Netherlands, Italy, Spain
CVE-2025-0897: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpcalc Modal Window – create popup modal window
Description
CVE-2025-0897 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Modal Window – create popup modal window' by wpcalc, affecting all versions up to 6. 1. 5. The flaw arises from insufficient sanitization and escaping of user input in the 'iframeBox' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. Exploitation requires authentication but no user interaction beyond visiting the affected page. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent exploitation. The threat primarily targets websites that allow contributor-level user roles and use this specific plugin, which is popular among WordPress users globally.
AI-Powered Analysis
Technical Analysis
CVE-2025-0897 is a stored Cross-Site Scripting vulnerability classified under CWE-79, found in the 'Modal Window – create popup modal window' WordPress plugin developed by wpcalc. This plugin enables site administrators to create popup modal windows using shortcodes, including 'iframeBox'. The vulnerability exists due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of user-supplied attributes within the 'iframeBox' shortcode. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts. Because the malicious script is stored persistently, it executes in the context of any user who views the infected page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability affects all plugin versions up to and including 6.1.5. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites that use this plugin and allow contributor-level access to untrusted users. The lack of patches at the time of disclosure necessitates immediate mitigation steps.
Potential Impact
The impact of CVE-2025-0897 is primarily on the confidentiality and integrity of affected WordPress sites. Successful exploitation allows an authenticated contributor or higher to inject persistent malicious scripts that execute in the browsers of site visitors and administrators. This can lead to theft of session cookies, enabling account takeover, unauthorized actions performed on behalf of users, defacement, or distribution of malware. Since the vulnerability requires contributor-level access, the threat is elevated in environments where contributor roles are granted to less trusted users or where account compromise is possible. The scope change in the CVSS vector indicates that the attack can affect resources beyond the initially compromised component, potentially impacting the entire site or user base. Although availability is not directly affected, the reputational damage and potential data breaches can be severe. Organizations running WordPress sites with this plugin, especially those with multiple contributors or public-facing content, face increased risk of targeted attacks and exploitation by malicious insiders or external attackers who have gained contributor credentials.
Mitigation Recommendations
1. Immediate mitigation involves restricting contributor-level access to trusted users only and auditing existing contributor accounts for suspicious activity. 2. Disable or remove the 'Modal Window – create popup modal window' plugin until a security patch is released. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'iframeBox' shortcode parameters. 4. Sanitize and validate all user inputs rigorously, especially those that can be embedded in shortcodes or HTML attributes. 5. Monitor logs for unusual script injections or changes to pages containing modal windows. 6. Educate content contributors about safe content practices and the risks of injecting untrusted code. 7. Once available, promptly apply official security patches from the plugin vendor. 8. Consider employing Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected sites. 9. Regularly back up site content and configurations to enable recovery if exploitation occurs. 10. Conduct periodic security assessments focusing on plugin vulnerabilities and user privilege management.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-30T19:15:25.397Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b6cb7ef31ef0b5554d4
Added to database: 2/25/2026, 9:36:44 PM
Last enriched: 2/25/2026, 11:58:48 PM
Last updated: 2/26/2026, 8:52:40 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.