CVE-2025-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wipeoutmedia CSS & JavaScript Toolbox
The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-11928 identifies a stored Cross-Site Scripting (XSS) vulnerability in the CSS & JavaScript Toolbox plugin for WordPress, maintained by wipeoutmedia. This vulnerability affects all plugin versions up to and including 12.0.5. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of administrator-supplied data in plugin settings. The flaw allows authenticated users with administrator or higher privileges to inject arbitrary JavaScript code into pages within multisite WordPress installations or installations where the unfiltered_html capability is disabled. When other users visit these injected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or further attacks within the multisite environment. The vulnerability requires high privileges (administrator) and does not require user interaction beyond visiting the affected page. The CVSS v3.1 score is 4.4 (medium), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability poses a risk in environments where multiple sites share the same WordPress installation, increasing the potential attack surface and impact. The lack of available patches at the time of publication necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in multisite WordPress environments where the CSS & JavaScript Toolbox plugin is installed and unfiltered_html is disabled. Successful exploitation can lead to unauthorized script execution, enabling attackers to hijack user sessions, steal sensitive data, or perform actions on behalf of other users within the multisite network. This can compromise the confidentiality and integrity of web applications and user data. Given the administrative privileges required, the threat is more likely to arise from insider threats or compromised administrator accounts. The impact is heightened in sectors relying heavily on WordPress multisite setups for managing multiple domains or subsidiaries, such as media companies, educational institutions, and government agencies. Disruption or data leakage could affect compliance with GDPR and other European data protection regulations, leading to legal and reputational consequences.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify multisite setups using the CSS & JavaScript Toolbox plugin up to version 12.0.5. Since no official patch is currently available, administrators should restrict administrator access strictly, enforce strong authentication mechanisms (e.g., MFA), and monitor admin activities for suspicious behavior. Temporarily disabling the plugin or migrating to alternative solutions with better security postures is advisable. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regularly backing up multisite configurations and data will facilitate recovery if exploitation occurs. Organizations should also review and tighten the use of the unfiltered_html capability to limit exposure. Finally, monitoring web logs and user activity for unusual patterns can help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wipeoutmedia CSS & JavaScript Toolbox
Description
The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-11928 identifies a stored Cross-Site Scripting (XSS) vulnerability in the CSS & JavaScript Toolbox plugin for WordPress, maintained by wipeoutmedia. This vulnerability affects all plugin versions up to and including 12.0.5. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of administrator-supplied data in plugin settings. The flaw allows authenticated users with administrator or higher privileges to inject arbitrary JavaScript code into pages within multisite WordPress installations or installations where the unfiltered_html capability is disabled. When other users visit these injected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or further attacks within the multisite environment. The vulnerability requires high privileges (administrator) and does not require user interaction beyond visiting the affected page. The CVSS v3.1 score is 4.4 (medium), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability poses a risk in environments where multiple sites share the same WordPress installation, increasing the potential attack surface and impact. The lack of available patches at the time of publication necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in multisite WordPress environments where the CSS & JavaScript Toolbox plugin is installed and unfiltered_html is disabled. Successful exploitation can lead to unauthorized script execution, enabling attackers to hijack user sessions, steal sensitive data, or perform actions on behalf of other users within the multisite network. This can compromise the confidentiality and integrity of web applications and user data. Given the administrative privileges required, the threat is more likely to arise from insider threats or compromised administrator accounts. The impact is heightened in sectors relying heavily on WordPress multisite setups for managing multiple domains or subsidiaries, such as media companies, educational institutions, and government agencies. Disruption or data leakage could affect compliance with GDPR and other European data protection regulations, leading to legal and reputational consequences.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify multisite setups using the CSS & JavaScript Toolbox plugin up to version 12.0.5. Since no official patch is currently available, administrators should restrict administrator access strictly, enforce strong authentication mechanisms (e.g., MFA), and monitor admin activities for suspicious behavior. Temporarily disabling the plugin or migrating to alternative solutions with better security postures is advisable. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regularly backing up multisite configurations and data will facilitate recovery if exploitation occurs. Organizations should also review and tighten the use of the unfiltered_html capability to limit exposure. Finally, monitoring web logs and user activity for unusual patterns can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-17T20:48:12.035Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905841371a6fc4aff3da4ab
Added to database: 11/1/2025, 3:52:51 AM
Last enriched: 11/10/2025, 2:28:43 AM
Last updated: 12/15/2025, 8:47:45 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14711: SQL Injection in FantasticLBP Hotels Server
MediumCVE-2025-14710: SQL Injection in FantasticLBP Hotels Server
MediumCVE-2025-14709: Buffer Overflow in Shiguangwu sgwbox N3
CriticalCVE-2025-14023: na in LINE Corporation LINE client for iOS
LowCVE-2025-14022: na in LINE Corporation LINE client for iOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.