CVE-2025-10133: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in salamzadeh URLYar URL Shortner
The URLYar URL Shortner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'urlyar_shortlink' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-10133 is a stored cross-site scripting vulnerability identified in the URLYar URL Shortner plugin for WordPress, affecting all versions up to and including 1.1.0. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the 'urlyar_shortlink' shortcode, which allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and has a CVSS 3.1 base score of 6.4, indicating medium severity. The attack vector is network-based, requiring low attack complexity and privileges but no user interaction. The scope is changed (S:C) because the vulnerability can affect other users beyond the attacker. No public exploits have been reported yet, but the risk remains significant due to the ease of exploitation by authenticated users. The plugin is commonly used in WordPress environments for URL shortening, making websites that rely on it vulnerable if they allow contributor-level access to untrusted users. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in plugins that process user-generated content.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the URLYar URL Shortner plugin installed. The impact includes potential compromise of user accounts through session hijacking, unauthorized actions performed on behalf of users, defacement of web content, and distribution of malware via injected scripts. Organizations with multiple content contributors or editors are particularly vulnerable since contributor-level access is sufficient to exploit the flaw. This can lead to reputational damage, data breaches involving user credentials or personal data, and disruption of web services. Given the widespread use of WordPress in Europe, especially among SMEs and media companies, the vulnerability could affect a broad range of sectors including publishing, e-commerce, and education. The medium severity score reflects that while the vulnerability does not directly impact system availability, it compromises confidentiality and integrity of user data and site content. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately audit WordPress sites to identify installations of the URLYar URL Shortner plugin and verify the version in use. 2) Restrict contributor-level access to trusted users only, minimizing the number of users who can exploit this vulnerability. 3) Monitor and review all uses of the 'urlyar_shortlink' shortcode in site content for suspicious or unauthorized modifications. 4) Apply any available patches or updates from the plugin vendor as soon as they are released; if no patch is available, consider temporarily disabling the plugin or replacing it with a secure alternative. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 6) Educate content contributors about the risks of injecting untrusted code and enforce strict content submission guidelines. 7) Regularly scan websites with security tools that detect XSS vulnerabilities and malicious script injections. 8) Employ Web Application Firewalls (WAFs) with rules targeting exploitation attempts of this specific shortcode vulnerability. These measures go beyond generic advice by focusing on access control, content monitoring, and layered defenses tailored to the plugin’s functionality and exploitation vector.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10133: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in salamzadeh URLYar URL Shortner
Description
The URLYar URL Shortner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'urlyar_shortlink' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-10133 is a stored cross-site scripting vulnerability identified in the URLYar URL Shortner plugin for WordPress, affecting all versions up to and including 1.1.0. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the 'urlyar_shortlink' shortcode, which allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and has a CVSS 3.1 base score of 6.4, indicating medium severity. The attack vector is network-based, requiring low attack complexity and privileges but no user interaction. The scope is changed (S:C) because the vulnerability can affect other users beyond the attacker. No public exploits have been reported yet, but the risk remains significant due to the ease of exploitation by authenticated users. The plugin is commonly used in WordPress environments for URL shortening, making websites that rely on it vulnerable if they allow contributor-level access to untrusted users. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in plugins that process user-generated content.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the URLYar URL Shortner plugin installed. The impact includes potential compromise of user accounts through session hijacking, unauthorized actions performed on behalf of users, defacement of web content, and distribution of malware via injected scripts. Organizations with multiple content contributors or editors are particularly vulnerable since contributor-level access is sufficient to exploit the flaw. This can lead to reputational damage, data breaches involving user credentials or personal data, and disruption of web services. Given the widespread use of WordPress in Europe, especially among SMEs and media companies, the vulnerability could affect a broad range of sectors including publishing, e-commerce, and education. The medium severity score reflects that while the vulnerability does not directly impact system availability, it compromises confidentiality and integrity of user data and site content. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately audit WordPress sites to identify installations of the URLYar URL Shortner plugin and verify the version in use. 2) Restrict contributor-level access to trusted users only, minimizing the number of users who can exploit this vulnerability. 3) Monitor and review all uses of the 'urlyar_shortlink' shortcode in site content for suspicious or unauthorized modifications. 4) Apply any available patches or updates from the plugin vendor as soon as they are released; if no patch is available, consider temporarily disabling the plugin or replacing it with a secure alternative. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 6) Educate content contributors about the risks of injecting untrusted code and enforce strict content submission guidelines. 7) Regularly scan websites with security tools that detect XSS vulnerabilities and malicious script injections. 8) Employ Web Application Firewalls (WAFs) with rules targeting exploitation attempts of this specific shortcode vulnerability. These measures go beyond generic advice by focusing on access control, content monitoring, and layered defenses tailored to the plugin’s functionality and exploitation vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-08T20:02:18.215Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7bc4f69c9730e56948
Added to database: 10/15/2025, 8:34:03 AM
Last enriched: 10/15/2025, 8:57:42 AM
Last updated: 10/16/2025, 8:47:32 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-0277: CWE-693 Protection Mechanism Failure in HCL Software BigFix Mobile
MediumF5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts
MediumCVE-2025-54539: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache ActiveMQ NMS AMQP Client
HighCVE-2025-0276: CWE-693 Protection Mechanism Failure in HCL Software BigFix Modern Client Management
MediumCVE-2024-0400: CWE-94 Improper Control of Generation of Code ('Code Injection') in Hitachi Energy MACH SCM
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.