CVE-2025-11875: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dr-thomas-fuessl SpendeOnline.org
The SpendeOnline.org plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'spendeonline' shortcode in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-11875 is a stored Cross-Site Scripting (XSS) vulnerability identified in the SpendeOnline.org plugin for WordPress, maintained by dr-thomas-fuessl. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically through the plugin's 'spendeonline' shortcode. All versions up to and including 3.0.1 are affected. The root cause is insufficient sanitization and escaping of user-supplied attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. This malicious code is stored persistently and executes in the context of any user who views the infected page, potentially compromising session tokens, cookies, or enabling further attacks such as privilege escalation or defacement. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the vulnerable component. No patches or known exploits are currently reported, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The plugin is commonly used by organizations managing online donations, increasing the attractiveness of this vulnerability to attackers targeting nonprofit or fundraising websites.
Potential Impact
For European organizations, particularly nonprofits and charities using WordPress with the SpendeOnline.org plugin, this vulnerability can lead to significant risks. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, unauthorized actions, data theft, or defacement. This undermines user trust and can damage organizational reputation. Since the vulnerability requires authenticated access, insider threats or compromised contributor accounts pose a direct risk. The persistent nature of stored XSS means that the malicious payload remains active until removed, increasing exposure time. Given the widespread use of WordPress across Europe and the importance of donation platforms, exploitation could disrupt fundraising activities and lead to regulatory scrutiny under GDPR if personal data is compromised.
Mitigation Recommendations
Immediate mitigation steps include restricting contributor-level access to trusted users only and monitoring for suspicious activity within the WordPress admin panel. Organizations should implement strict input validation and output escaping on all user-generated content, especially shortcodes. Deploying a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide a protective layer. Regularly auditing installed plugins and promptly applying updates when patches become available is critical. In the absence of an official patch, temporarily disabling or removing the SpendeOnline.org plugin can eliminate the attack vector. Additionally, organizations should educate contributors on secure content submission practices and monitor logs for signs of exploitation attempts. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium
CVE-2025-11875: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dr-thomas-fuessl SpendeOnline.org
Description
The SpendeOnline.org plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'spendeonline' shortcode in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-11875 is a stored Cross-Site Scripting (XSS) vulnerability identified in the SpendeOnline.org plugin for WordPress, maintained by dr-thomas-fuessl. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically through the plugin's 'spendeonline' shortcode. All versions up to and including 3.0.1 are affected. The root cause is insufficient sanitization and escaping of user-supplied attributes, allowing authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. This malicious code is stored persistently and executes in the context of any user who views the infected page, potentially compromising session tokens, cookies, or enabling further attacks such as privilege escalation or defacement. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the vulnerable component. No patches or known exploits are currently reported, but the vulnerability's presence in a widely used WordPress plugin makes it a notable risk. The plugin is commonly used by organizations managing online donations, increasing the attractiveness of this vulnerability to attackers targeting nonprofit or fundraising websites.
Potential Impact
For European organizations, particularly nonprofits and charities using WordPress with the SpendeOnline.org plugin, this vulnerability can lead to significant risks. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, unauthorized actions, data theft, or defacement. This undermines user trust and can damage organizational reputation. Since the vulnerability requires authenticated access, insider threats or compromised contributor accounts pose a direct risk. The persistent nature of stored XSS means that the malicious payload remains active until removed, increasing exposure time. Given the widespread use of WordPress across Europe and the importance of donation platforms, exploitation could disrupt fundraising activities and lead to regulatory scrutiny under GDPR if personal data is compromised.
Mitigation Recommendations
Immediate mitigation steps include restricting contributor-level access to trusted users only and monitoring for suspicious activity within the WordPress admin panel. Organizations should implement strict input validation and output escaping on all user-generated content, especially shortcodes. Deploying a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide a protective layer. Regularly auditing installed plugins and promptly applying updates when patches become available is critical. In the absence of an official patch, temporarily disabling or removing the SpendeOnline.org plugin can eliminate the attack vector. Additionally, organizations should educate contributors on secure content submission practices and monitor logs for signs of exploitation attempts. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-16T16:33:04.083Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fc745855d697d32d439075
Added to database: 10/25/2025, 6:55:20 AM
Last enriched: 11/1/2025, 8:03:08 AM
Last updated: 12/8/2025, 4:33:09 PM
Views: 184
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65796: n/a
UnknownCVE-2025-14251: SQL Injection in code-projects Online Ordering System
MediumCVE-2025-65797: n/a
UnknownCVE-2025-65795: n/a
UnknownCVE-2025-65798: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.