Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10133: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in salamzadeh URLYar URL Shortner

0
Medium
VulnerabilityCVE-2025-10133cvecve-2025-10133cwe-79
Published: Wed Oct 15 2025 (10/15/2025, 08:25:55 UTC)
Source: CVE Database V5
Vendor/Project: salamzadeh
Product: URLYar URL Shortner

Description

The URLYar URL Shortner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'urlyar_shortlink' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 10/15/2025, 08:57:42 UTC

Technical Analysis

CVE-2025-10133 is a stored cross-site scripting vulnerability identified in the URLYar URL Shortner plugin for WordPress, affecting all versions up to and including 1.1.0. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the 'urlyar_shortlink' shortcode, which allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and has a CVSS 3.1 base score of 6.4, indicating medium severity. The attack vector is network-based, requiring low attack complexity and privileges but no user interaction. The scope is changed (S:C) because the vulnerability can affect other users beyond the attacker. No public exploits have been reported yet, but the risk remains significant due to the ease of exploitation by authenticated users. The plugin is commonly used in WordPress environments for URL shortening, making websites that rely on it vulnerable if they allow contributor-level access to untrusted users. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in plugins that process user-generated content.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the URLYar URL Shortner plugin installed. The impact includes potential compromise of user accounts through session hijacking, unauthorized actions performed on behalf of users, defacement of web content, and distribution of malware via injected scripts. Organizations with multiple content contributors or editors are particularly vulnerable since contributor-level access is sufficient to exploit the flaw. This can lead to reputational damage, data breaches involving user credentials or personal data, and disruption of web services. Given the widespread use of WordPress in Europe, especially among SMEs and media companies, the vulnerability could affect a broad range of sectors including publishing, e-commerce, and education. The medium severity score reflects that while the vulnerability does not directly impact system availability, it compromises confidentiality and integrity of user data and site content. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Immediately audit WordPress sites to identify installations of the URLYar URL Shortner plugin and verify the version in use. 2) Restrict contributor-level access to trusted users only, minimizing the number of users who can exploit this vulnerability. 3) Monitor and review all uses of the 'urlyar_shortlink' shortcode in site content for suspicious or unauthorized modifications. 4) Apply any available patches or updates from the plugin vendor as soon as they are released; if no patch is available, consider temporarily disabling the plugin or replacing it with a secure alternative. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 6) Educate content contributors about the risks of injecting untrusted code and enforce strict content submission guidelines. 7) Regularly scan websites with security tools that detect XSS vulnerabilities and malicious script injections. 8) Employ Web Application Firewalls (WAFs) with rules targeting exploitation attempts of this specific shortcode vulnerability. These measures go beyond generic advice by focusing on access control, content monitoring, and layered defenses tailored to the plugin’s functionality and exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-08T20:02:18.215Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef5c7bc4f69c9730e56948

Added to database: 10/15/2025, 8:34:03 AM

Last enriched: 10/15/2025, 8:57:42 AM

Last updated: 10/16/2025, 8:47:32 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats