CVE-2025-1039: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yonifre Lenix Leads Collector
The Lenix Elementor Leads addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a URL form field in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-1039 is a stored Cross-Site Scripting (XSS) vulnerability identified in the yonifre Lenix Leads Collector plugin for WordPress, affecting all versions up to and including 1.8.2. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of a URL form field. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user visiting the affected page. Because the attack vector is a URL form field, attackers can craft malicious URLs that, when accessed, trigger the embedded script. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, no user interaction needed, and a scope change that affects confidentiality and integrity. The impact includes potential theft of user credentials, session tokens, or other sensitive information, as well as the ability to perform actions on behalf of the user. No official patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on February 4, 2025, and published on February 20, 2025, by Wordfence. Given the widespread use of WordPress and the popularity of lead collection plugins, this vulnerability poses a significant risk to websites relying on this plugin for lead management.
Potential Impact
The impact of CVE-2025-1039 is substantial for organizations using the yonifre Lenix Leads Collector plugin. Successful exploitation can lead to the execution of arbitrary scripts in the browsers of site visitors or administrators, potentially resulting in session hijacking, credential theft, defacement, or redirection to malicious sites. This compromises the confidentiality and integrity of user data and can damage organizational reputation. Since the vulnerability requires no authentication or user interaction, attackers can automate exploitation at scale, increasing the risk of widespread compromise. For businesses relying on this plugin for lead generation, exploitation could disrupt marketing operations and erode customer trust. Additionally, compromised administrative accounts could lead to further site-wide control loss or malware deployment. The vulnerability's scope change means that the attack affects resources beyond the vulnerable component, amplifying the potential damage.
Mitigation Recommendations
To mitigate CVE-2025-1039, organizations should immediately assess their use of the yonifre Lenix Leads Collector plugin and upgrade to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on all URL form fields within the plugin's codebase, focusing on sanitizing user-supplied data before rendering. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable parameters. Disable or restrict the plugin temporarily if feasible until a fix is applied. Conduct thorough security audits and penetration testing to identify any exploitation attempts. Educate site administrators and users about the risks of clicking on suspicious links. Additionally, implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Monitor logs for unusual activity and prepare incident response plans to quickly address any compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2025-1039: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yonifre Lenix Leads Collector
Description
The Lenix Elementor Leads addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a URL form field in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-1039 is a stored Cross-Site Scripting (XSS) vulnerability identified in the yonifre Lenix Leads Collector plugin for WordPress, affecting all versions up to and including 1.8.2. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of a URL form field. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user visiting the affected page. Because the attack vector is a URL form field, attackers can craft malicious URLs that, when accessed, trigger the embedded script. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, no user interaction needed, and a scope change that affects confidentiality and integrity. The impact includes potential theft of user credentials, session tokens, or other sensitive information, as well as the ability to perform actions on behalf of the user. No official patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on February 4, 2025, and published on February 20, 2025, by Wordfence. Given the widespread use of WordPress and the popularity of lead collection plugins, this vulnerability poses a significant risk to websites relying on this plugin for lead management.
Potential Impact
The impact of CVE-2025-1039 is substantial for organizations using the yonifre Lenix Leads Collector plugin. Successful exploitation can lead to the execution of arbitrary scripts in the browsers of site visitors or administrators, potentially resulting in session hijacking, credential theft, defacement, or redirection to malicious sites. This compromises the confidentiality and integrity of user data and can damage organizational reputation. Since the vulnerability requires no authentication or user interaction, attackers can automate exploitation at scale, increasing the risk of widespread compromise. For businesses relying on this plugin for lead generation, exploitation could disrupt marketing operations and erode customer trust. Additionally, compromised administrative accounts could lead to further site-wide control loss or malware deployment. The vulnerability's scope change means that the attack affects resources beyond the vulnerable component, amplifying the potential damage.
Mitigation Recommendations
To mitigate CVE-2025-1039, organizations should immediately assess their use of the yonifre Lenix Leads Collector plugin and upgrade to a patched version once available. In the absence of an official patch, implement strict input validation and output encoding on all URL form fields within the plugin's codebase, focusing on sanitizing user-supplied data before rendering. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable parameters. Disable or restrict the plugin temporarily if feasible until a fix is applied. Conduct thorough security audits and penetration testing to identify any exploitation attempts. Educate site administrators and users about the risks of clicking on suspicious links. Additionally, implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Monitor logs for unusual activity and prepare incident response plans to quickly address any compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-04T18:21:57.372Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b0db7ef31ef0b54d957
Added to database: 2/25/2026, 9:35:09 PM
Last enriched: 2/25/2026, 9:51:05 PM
Last updated: 2/26/2026, 8:57:32 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
UnknownCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
UnknownCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
UnknownCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
UnknownCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.