CVE-2025-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wipeoutmedia CSS & JavaScript Toolbox
The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-11928 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the wipeoutmedia CSS & JavaScript Toolbox plugin for WordPress. This vulnerability affects all plugin versions up to and including 12.0.5. The root cause is insufficient input sanitization and output escaping in the plugin's admin settings interface, which allows authenticated users with administrator-level permissions or higher to inject arbitrary JavaScript code into pages. The vulnerability specifically impacts WordPress multi-site installations where the unfiltered_html capability is disabled, a configuration that restricts users from posting unfiltered HTML content. Exploitation requires high privileges (administrator or above) and does not require user interaction beyond visiting the injected page. When a user accesses a page containing the injected script, the malicious code executes in their browser context, potentially enabling session hijacking, privilege escalation, or other malicious activities. The CVSS v3.1 base score is 4.4 (medium severity), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported to date, and no patches are currently linked, indicating that mitigation may rely on plugin updates or configuration changes. The vulnerability's scope is limited to multi-site WordPress environments with specific configurations, reducing its overall attack surface but still posing a risk to affected installations.
Potential Impact
For European organizations, the impact of CVE-2025-11928 depends on the prevalence of multi-site WordPress installations using the vulnerable CSS & JavaScript Toolbox plugin. Successful exploitation could lead to unauthorized script execution in users' browsers, enabling session hijacking, data theft, or administrative privilege escalation within the WordPress environment. This can compromise website integrity, user trust, and potentially expose sensitive data. Given the requirement for administrator-level access to exploit, the threat is more significant in environments with weak internal access controls or compromised admin accounts. Organizations running multi-site WordPress setups for managing multiple domains or sub-sites are at higher risk. The vulnerability could also be leveraged as a foothold for further attacks within the network. In Europe, where WordPress is widely used for corporate and governmental websites, this vulnerability could affect public-facing portals, intranets, or e-commerce platforms, potentially disrupting services and damaging reputations. However, the medium severity and lack of known exploits reduce the immediate risk, though targeted attacks remain possible.
Mitigation Recommendations
1. Immediately audit all WordPress installations to identify multi-site environments using the CSS & JavaScript Toolbox plugin, especially versions up to 12.0.5. 2. Restrict administrator-level access strictly to trusted personnel and enforce strong authentication methods such as multi-factor authentication (MFA). 3. If a patch is released, apply it promptly; in the absence of a patch, consider disabling or removing the plugin from multi-site installations. 4. Enable and enforce strict input validation and output escaping within WordPress admin settings to prevent script injection. 5. Monitor logs and website content for unusual script injections or unauthorized changes in admin settings. 6. Educate administrators about the risks of injecting scripts and the importance of secure plugin management. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script payloads in admin requests. 8. Regularly back up WordPress sites and configurations to enable rapid recovery if compromise occurs. 9. Review and tighten the unfiltered_html capability settings to minimize exposure. 10. Conduct periodic security assessments focusing on plugin vulnerabilities and multi-site configurations.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wipeoutmedia CSS & JavaScript Toolbox
Description
The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-11928 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the wipeoutmedia CSS & JavaScript Toolbox plugin for WordPress. This vulnerability affects all plugin versions up to and including 12.0.5. The root cause is insufficient input sanitization and output escaping in the plugin's admin settings interface, which allows authenticated users with administrator-level permissions or higher to inject arbitrary JavaScript code into pages. The vulnerability specifically impacts WordPress multi-site installations where the unfiltered_html capability is disabled, a configuration that restricts users from posting unfiltered HTML content. Exploitation requires high privileges (administrator or above) and does not require user interaction beyond visiting the injected page. When a user accesses a page containing the injected script, the malicious code executes in their browser context, potentially enabling session hijacking, privilege escalation, or other malicious activities. The CVSS v3.1 base score is 4.4 (medium severity), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported to date, and no patches are currently linked, indicating that mitigation may rely on plugin updates or configuration changes. The vulnerability's scope is limited to multi-site WordPress environments with specific configurations, reducing its overall attack surface but still posing a risk to affected installations.
Potential Impact
For European organizations, the impact of CVE-2025-11928 depends on the prevalence of multi-site WordPress installations using the vulnerable CSS & JavaScript Toolbox plugin. Successful exploitation could lead to unauthorized script execution in users' browsers, enabling session hijacking, data theft, or administrative privilege escalation within the WordPress environment. This can compromise website integrity, user trust, and potentially expose sensitive data. Given the requirement for administrator-level access to exploit, the threat is more significant in environments with weak internal access controls or compromised admin accounts. Organizations running multi-site WordPress setups for managing multiple domains or sub-sites are at higher risk. The vulnerability could also be leveraged as a foothold for further attacks within the network. In Europe, where WordPress is widely used for corporate and governmental websites, this vulnerability could affect public-facing portals, intranets, or e-commerce platforms, potentially disrupting services and damaging reputations. However, the medium severity and lack of known exploits reduce the immediate risk, though targeted attacks remain possible.
Mitigation Recommendations
1. Immediately audit all WordPress installations to identify multi-site environments using the CSS & JavaScript Toolbox plugin, especially versions up to 12.0.5. 2. Restrict administrator-level access strictly to trusted personnel and enforce strong authentication methods such as multi-factor authentication (MFA). 3. If a patch is released, apply it promptly; in the absence of a patch, consider disabling or removing the plugin from multi-site installations. 4. Enable and enforce strict input validation and output escaping within WordPress admin settings to prevent script injection. 5. Monitor logs and website content for unusual script injections or unauthorized changes in admin settings. 6. Educate administrators about the risks of injecting scripts and the importance of secure plugin management. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script payloads in admin requests. 8. Regularly back up WordPress sites and configurations to enable rapid recovery if compromise occurs. 9. Review and tighten the unfiltered_html capability settings to minimize exposure. 10. Conduct periodic security assessments focusing on plugin vulnerabilities and multi-site configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-17T20:48:12.035Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905841371a6fc4aff3da4ab
Added to database: 11/1/2025, 3:52:51 AM
Last enriched: 11/1/2025, 4:01:15 AM
Last updated: 11/1/2025, 4:20:01 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.