Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads

0
Medium
VulnerabilityCVE-2025-11745cvecve-2025-11745cwe-80
Published: Wed Nov 05 2025 (11/05/2025, 11:24:40 UTC)
Source: CVE Database V5
Vendor/Project: spacetime
Product: Ad Inserter – Ad Manager & AdSense Ads

Description

CVE-2025-11745 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Ad Inserter – Ad Manager & AdSense Ads' up to version 2. 8. 7. It arises from improper sanitization and escaping of user-supplied attributes in the 'adinserter' shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. European organizations using this plugin on WordPress sites are at risk, especially those with multiple contributors. Mitigation involves promptly updating the plugin once a patch is available, restricting contributor permissions, and implementing additional input validation and output encoding at the application level. Countries with high WordPress adoption and significant digital media presence, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 11/12/2025, 11:58:03 UTC

Technical Analysis

CVE-2025-11745 is a stored cross-site scripting (XSS) vulnerability identified in the 'Ad Inserter – Ad Manager & AdSense Ads' WordPress plugin, versions up to and including 2.8.7. The root cause is insufficient input sanitization and output escaping of user-supplied attributes within the plugin's 'adinserter' shortcode, specifically when handling custom fields. Authenticated users with contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts. Since the malicious script is stored persistently, it executes every time a user accesses the compromised page, potentially leading to session hijacking, credential theft, or unauthorized actions performed in the context of the victim's browser session. The vulnerability is classified under CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page), indicating a basic XSS issue. The CVSS v3.1 base score is 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and scope changed due to impact on other components. No known public exploits have been reported yet, but the vulnerability poses a significant risk given the widespread use of WordPress and the plugin's popularity. The vulnerability affects all versions up to 2.8.7, and no official patch links are currently available, suggesting that users should monitor vendor advisories closely. The flaw allows attackers to bypass typical input validation safeguards, emphasizing the need for robust sanitization and output encoding in plugin development. This vulnerability can be leveraged to compromise site integrity and user trust, especially on sites with multiple contributors or editors.

Potential Impact

For European organizations, the impact of CVE-2025-11745 can be substantial, particularly for those relying on WordPress sites for business operations, marketing, or content delivery. Exploitation could lead to unauthorized script execution, resulting in session hijacking, defacement, or redirection to malicious sites, thereby damaging brand reputation and user trust. Confidential information such as user credentials or personal data could be exposed, potentially violating GDPR and other data protection regulations, leading to legal and financial repercussions. The medium CVSS score reflects moderate risk, but the ease of exploitation by contributors means insider threats or compromised accounts can quickly escalate the issue. Organizations with multiple content editors or contributors are at higher risk. Additionally, the persistent nature of stored XSS means that once injected, malicious scripts can affect all visitors until remediated, increasing the attack surface. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the widespread use of the plugin in Europe, especially in countries with high WordPress adoption, increases the likelihood of targeted attacks. The vulnerability could also be leveraged as a foothold for further attacks within the network if combined with other vulnerabilities or social engineering tactics.

Mitigation Recommendations

1. Monitor the plugin vendor's official channels for security patches and apply updates immediately once available. 2. Until a patch is released, restrict contributor-level permissions and review user roles to minimize the number of users who can inject content via the 'adinserter' shortcode. 3. Implement web application firewall (WAF) rules to detect and block suspicious script injections targeting the plugin's shortcode parameters. 4. Conduct regular security audits and code reviews of custom fields and shortcode usage to identify and sanitize any user inputs rigorously. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content submission guidelines. 7. Use security plugins that can detect and alert on XSS attempts or anomalous script insertions. 8. Backup website data regularly to enable quick restoration in case of compromise. 9. Consider isolating critical WordPress instances or using staging environments to test plugin updates before production deployment. 10. Review and harden authentication mechanisms to prevent unauthorized access by attackers who might exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T14:19:15.708Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b36fdeb4434bb4f874748

Added to database: 11/5/2025, 11:37:33 AM

Last enriched: 11/12/2025, 11:58:03 AM

Last updated: 12/20/2025, 7:24:39 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats