Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10128: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in michaellow Eulerpool Research Systems

0
Medium
VulnerabilityCVE-2025-10128cvecve-2025-10128cwe-80
Published: Tue Sep 30 2025 (09/30/2025, 03:35:32 UTC)
Source: CVE Database V5
Vendor/Project: michaellow
Product: Eulerpool Research Systems

Description

CVE-2025-10128 is a stored Cross-Site Scripting (XSS) vulnerability in the Eulerpool Research Systems WordPress plugin, affecting all versions up to 4. 0. 1. Authenticated users with contributor-level access or higher can exploit insufficient input sanitization in the 'aaq' shortcode to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking or defacement. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild yet. It requires authentication but no user interaction beyond page access. European organizations using this plugin on WordPress sites are at risk, especially those with contributor-level user roles. Mitigation involves applying patches once available, restricting contributor privileges, and implementing additional input validation and output escaping.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:33:20 UTC

Technical Analysis

CVE-2025-10128 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-80, affecting the Eulerpool Research Systems plugin for WordPress. The vulnerability arises from improper neutralization of script-related HTML tags due to insufficient input sanitization and output escaping on user-supplied attributes within the plugin's 'aaq' shortcode. This flaw allows authenticated attackers with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, defacement, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions up to and including 4.0.1 of the plugin. The CVSS v3.1 base score is 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change (S:C). The impact affects confidentiality and integrity but not availability. No public exploits have been reported yet. The vulnerability was published on September 30, 2025, and assigned by Wordfence. The absence of patches at the time of reporting necessitates immediate mitigation steps to reduce risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites running WordPress with the Eulerpool Research Systems plugin installed. Since exploitation requires contributor-level access, insider threats or compromised contributor accounts could lead to malicious script injection. The injected scripts can steal session cookies, perform unauthorized actions, or deface content, undermining user trust and potentially exposing sensitive information. This can lead to reputational damage, regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and financial losses. Organizations with public-facing websites or those relying on WordPress for content management are particularly vulnerable. The medium severity score indicates a moderate but actionable threat. The lack of known exploits suggests a window for proactive defense. However, the scope of impact is limited to sites using this specific plugin, which may be more prevalent in certain European markets. The vulnerability could be leveraged in targeted attacks against high-value organizations or sectors such as media, education, or government that use WordPress extensively.

Mitigation Recommendations

1. Immediately audit WordPress installations to identify the presence of the Eulerpool Research Systems plugin and its version. 2. Restrict contributor-level access strictly to trusted users and review user roles to minimize the number of users with sufficient privileges to exploit this vulnerability. 3. Until an official patch is released, implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'aaq' shortcode parameters. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 5. Sanitize and validate all user inputs on the server side, especially those related to shortcode attributes, to prevent script injection. 6. Monitor logs and user activity for suspicious behavior indicative of exploitation attempts. 7. Once a patch is available, prioritize its deployment across all affected systems. 8. Educate content contributors about the risks of injecting untrusted content and enforce secure content creation policies. 9. Consider temporarily disabling the vulnerable shortcode if feasible to eliminate the attack vector. 10. Regularly update WordPress and plugins to reduce exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-08T19:18:38.345Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db52aea473ffe031e44787

Added to database: 9/30/2025, 3:46:54 AM

Last enriched: 10/7/2025, 11:33:20 AM

Last updated: 10/7/2025, 1:51:46 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats