CVE-2025-10194: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in eflyjason Shortcode Button
The Shortcode Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'button' shortcode in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-10194 is a stored Cross-Site Scripting (XSS) vulnerability identified in the eflyjason Shortcode Button plugin for WordPress, affecting all versions up to and including 1.1.9. The vulnerability arises from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of user-supplied attributes in the plugin's 'button' shortcode. Authenticated users with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts via the shortcode parameters. Because the injected scripts are stored persistently, they execute in the context of any user who views the affected page, potentially compromising session cookies, redirecting users, or performing unauthorized actions. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change. No public exploits have been reported yet, but the risk remains significant due to the widespread use of WordPress and the plugin. The vulnerability is classified under CWE-79, highlighting the failure to properly sanitize input leading to XSS. The lack of patches at the time of reporting necessitates immediate mitigation steps by administrators. This vulnerability underscores the importance of secure coding practices in WordPress plugins, especially those that process user-generated content.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the eflyjason Shortcode Button plugin installed. Exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware via injected scripts. Organizations with multiple contributors or editors on their WordPress sites are particularly vulnerable since the attack requires contributor-level access. The compromise of user sessions can lead to data leakage, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed or manipulated. Additionally, the persistent nature of stored XSS means that the malicious code remains active until removed, increasing the window of exposure. Although no known exploits are in the wild, the medium CVSS score and ease of exploitation by authenticated users make this a credible threat. The impact is heightened for sectors relying heavily on web presence, such as e-commerce, media, and public services within Europe.
Mitigation Recommendations
1. Immediately audit WordPress sites for the presence of the eflyjason Shortcode Button plugin and identify versions up to 1.1.9. 2. Restrict contributor-level access strictly to trusted users and review user roles to minimize the number of users who can inject content. 3. Until an official patch is released, consider disabling or removing the plugin to eliminate the attack surface. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute inputs that may contain script tags or event handlers. 5. Educate content contributors about the risks of injecting untrusted code and enforce content review policies. 6. Monitor website logs and user activity for unusual behavior that could indicate exploitation attempts. 7. Once a patch is available, apply it promptly and verify that input sanitization and output escaping are correctly implemented. 8. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script sources. 9. Regularly update WordPress core and all plugins to minimize exposure to known vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10194: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in eflyjason Shortcode Button
Description
The Shortcode Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'button' shortcode in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-10194 is a stored Cross-Site Scripting (XSS) vulnerability identified in the eflyjason Shortcode Button plugin for WordPress, affecting all versions up to and including 1.1.9. The vulnerability arises from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of user-supplied attributes in the plugin's 'button' shortcode. Authenticated users with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts via the shortcode parameters. Because the injected scripts are stored persistently, they execute in the context of any user who views the affected page, potentially compromising session cookies, redirecting users, or performing unauthorized actions. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change. No public exploits have been reported yet, but the risk remains significant due to the widespread use of WordPress and the plugin. The vulnerability is classified under CWE-79, highlighting the failure to properly sanitize input leading to XSS. The lack of patches at the time of reporting necessitates immediate mitigation steps by administrators. This vulnerability underscores the importance of secure coding practices in WordPress plugins, especially those that process user-generated content.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the eflyjason Shortcode Button plugin installed. Exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware via injected scripts. Organizations with multiple contributors or editors on their WordPress sites are particularly vulnerable since the attack requires contributor-level access. The compromise of user sessions can lead to data leakage, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed or manipulated. Additionally, the persistent nature of stored XSS means that the malicious code remains active until removed, increasing the window of exposure. Although no known exploits are in the wild, the medium CVSS score and ease of exploitation by authenticated users make this a credible threat. The impact is heightened for sectors relying heavily on web presence, such as e-commerce, media, and public services within Europe.
Mitigation Recommendations
1. Immediately audit WordPress sites for the presence of the eflyjason Shortcode Button plugin and identify versions up to 1.1.9. 2. Restrict contributor-level access strictly to trusted users and review user roles to minimize the number of users who can inject content. 3. Until an official patch is released, consider disabling or removing the plugin to eliminate the attack surface. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute inputs that may contain script tags or event handlers. 5. Educate content contributors about the risks of injecting untrusted code and enforce content review policies. 6. Monitor website logs and user activity for unusual behavior that could indicate exploitation attempts. 7. Once a patch is available, apply it promptly and verify that input sanitization and output escaping are correctly implemented. 8. Employ Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script sources. 9. Regularly update WordPress core and all plugins to minimize exposure to known vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-09T16:05:30.865Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7cc4f69c9730e5696b
Added to database: 10/15/2025, 8:34:04 AM
Last enriched: 10/15/2025, 8:56:38 AM
Last updated: 10/15/2025, 10:58:43 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
MediumCVE-2025-43281: A local attacker may be able to elevate their privileges in Apple macOS
UnknownCVE-2025-43280: Forwarding an email could display remote images in Mail in Lockdown Mode in Apple iOS and iPadOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.