Skip to main content

CVE-2025-10490: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dylanjkotze Zephyr Project Manager

Medium
VulnerabilityCVE-2025-10490cvecve-2025-10490cwe-79
Published: Fri Sep 26 2025 (09/26/2025, 06:43:29 UTC)
Source: CVE Database V5
Vendor/Project: dylanjkotze
Product: Zephyr Project Manager

Description

The Zephyr Project Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.3.202 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 09/26/2025, 06:49:26 UTC

Technical Analysis

CVE-2025-10490 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Zephyr Project Manager plugin for WordPress, developed by dylanjkotze. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient input sanitization and output escaping in the plugin's admin settings. The flaw allows authenticated users with administrator-level permissions or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress multisite environment. Importantly, this vulnerability only affects multisite WordPress installations or installations where the unfiltered_html capability is disabled, limiting its scope. The CVSS v3.1 base score is 4.4, reflecting a medium severity with network attack vector, high attack complexity, requiring high privileges, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on September 26, 2025, and affects all versions up to and including 3.3.202 of the plugin.

Potential Impact

For European organizations using WordPress multisite installations with the Zephyr Project Manager plugin, this vulnerability poses a risk of unauthorized script execution within the administrative context. An attacker with administrator privileges could inject malicious JavaScript that executes in the browsers of other administrators or users with elevated permissions, potentially leading to theft of authentication tokens, manipulation of project management data, or unauthorized administrative actions. While the requirement for administrator-level access limits the initial attack surface, insider threats or compromised administrator accounts could exploit this vulnerability to escalate attacks. The impact on confidentiality and integrity could disrupt project workflows, leak sensitive project information, or facilitate further compromise of the WordPress environment. Given the widespread use of WordPress in Europe, especially among SMEs and public sector organizations, the vulnerability could affect entities relying on this plugin for project management in multisite setups. However, the absence of known exploits and the medium severity score suggest a moderate risk level, contingent on the presence of the plugin and specific configuration settings.

Mitigation Recommendations

European organizations should immediately audit their WordPress multisite installations to identify the presence of the Zephyr Project Manager plugin, especially versions up to 3.3.202. Since no official patches are currently linked, organizations should consider the following practical steps: 1) Restrict administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised credentials; 2) Temporarily disable or remove the Zephyr Project Manager plugin in multisite environments or where unfiltered_html is disabled until a patch is available; 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts; 4) Monitor administrative pages for unusual script injections or modifications; 5) Educate administrators about the risks of stored XSS and safe input handling; 6) Regularly back up WordPress configurations and data to enable rapid recovery if exploitation occurs; 7) Stay updated with vendor advisories for forthcoming patches and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-15T15:23:44.983Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d6368f9104bf76542472b9

Added to database: 9/26/2025, 6:45:35 AM

Last enriched: 9/26/2025, 6:49:26 AM

Last updated: 9/26/2025, 8:34:51 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats