Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10636: CWE-79 Cross-Site Scripting (XSS) in NS Maintenance Mode for WP

0
Low
VulnerabilityCVE-2025-10636cvecve-2025-10636cwe-79
Published: Thu Oct 30 2025 (10/30/2025, 06:00:07 UTC)
Source: CVE Database V5
Product: NS Maintenance Mode for WP

Description

The NS Maintenance Mode for WP WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 11/06/2025, 07:34:46 UTC

Technical Analysis

CVE-2025-10636 identifies a stored Cross-Site Scripting (XSS) vulnerability in the NS Maintenance Mode for WP plugin for WordPress, affecting versions through 1.3.1. The root cause is the plugin's failure to sanitize and escape certain settings inputs properly. This flaw allows users with high privileges, specifically administrators, to inject malicious JavaScript code that is stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress capability unfiltered_html is disabled, which is common in multisite environments to restrict HTML input. The attack vector requires the attacker to have administrator-level access and involves user interaction, such as an admin saving malicious settings. The CVSS 3.1 base score of 3.5 reflects a low severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), unchanged scope (S:U), and limited confidentiality and integrity impacts (C:L, I:L), with no availability impact (A:N). Exploitation could lead to session hijacking, defacement, or privilege escalation within the WordPress admin context. No public exploits or patches are currently available, but the vulnerability is published and should be addressed promptly. The plugin is used to manage maintenance mode in WordPress sites, which are widely deployed across many organizations, including in Europe.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily to the confidentiality and integrity of WordPress administrative sessions. Successful exploitation could allow attackers with admin access to execute arbitrary scripts, potentially leading to session hijacking, unauthorized actions, or the insertion of malicious content. Although the vulnerability requires high privileges and user interaction, it can be particularly impactful in multisite WordPress environments common in larger organizations or managed service providers. Given the widespread use of WordPress in Europe for corporate websites, e-commerce, and internal portals, exploitation could result in reputational damage, data leakage, or further compromise of internal systems. The low CVSS score reflects limited direct impact, but the persistence of stored XSS and the administrative context elevate the threat in environments with multiple administrators or less stringent access controls. Organizations with multisite setups or those that restrict unfiltered_html capability may have a false sense of security, as this vulnerability bypasses those restrictions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first monitor for updates or patches from the plugin developer and apply them promptly once available. Until a patch is released, restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Implement strict input validation and sanitization controls at the application level, possibly using Web Application Firewalls (WAFs) configured to detect and block XSS payloads targeting WordPress admin interfaces. Employ Content Security Policies (CSP) to limit the execution of unauthorized scripts within the WordPress admin dashboard. Regularly audit and review plugin settings and administrative actions to detect suspicious changes. For multisite environments, consider isolating critical sites or limiting plugin usage to reduce attack surface. Additionally, educate administrators about the risks of stored XSS and safe handling of plugin settings. Finally, maintain comprehensive backups to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-09-17T13:29:16.380Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69030287a36935f67201748e

Added to database: 10/30/2025, 6:15:35 AM

Last enriched: 11/6/2025, 7:34:46 AM

Last updated: 12/14/2025, 4:17:32 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats