Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wipeoutmedia CSS & JavaScript Toolbox

0
Medium
VulnerabilityCVE-2025-11928cvecve-2025-11928cwe-79
Published: Sat Nov 01 2025 (11/01/2025, 03:34:36 UTC)
Source: CVE Database V5
Vendor/Project: wipeoutmedia
Product: CSS & JavaScript Toolbox

Description

The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 11/10/2025, 02:28:43 UTC

Technical Analysis

CVE-2025-11928 identifies a stored Cross-Site Scripting (XSS) vulnerability in the CSS & JavaScript Toolbox plugin for WordPress, maintained by wipeoutmedia. This vulnerability affects all plugin versions up to and including 12.0.5. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of administrator-supplied data in plugin settings. The flaw allows authenticated users with administrator or higher privileges to inject arbitrary JavaScript code into pages within multisite WordPress installations or installations where the unfiltered_html capability is disabled. When other users visit these injected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or further attacks within the multisite environment. The vulnerability requires high privileges (administrator) and does not require user interaction beyond visiting the affected page. The CVSS v3.1 score is 4.4 (medium), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and partial confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability poses a risk in environments where multiple sites share the same WordPress installation, increasing the potential attack surface and impact. The lack of available patches at the time of publication necessitates immediate mitigation steps by administrators.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in multisite WordPress environments where the CSS & JavaScript Toolbox plugin is installed and unfiltered_html is disabled. Successful exploitation can lead to unauthorized script execution, enabling attackers to hijack user sessions, steal sensitive data, or perform actions on behalf of other users within the multisite network. This can compromise the confidentiality and integrity of web applications and user data. Given the administrative privileges required, the threat is more likely to arise from insider threats or compromised administrator accounts. The impact is heightened in sectors relying heavily on WordPress multisite setups for managing multiple domains or subsidiaries, such as media companies, educational institutions, and government agencies. Disruption or data leakage could affect compliance with GDPR and other European data protection regulations, leading to legal and reputational consequences.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify multisite setups using the CSS & JavaScript Toolbox plugin up to version 12.0.5. Since no official patch is currently available, administrators should restrict administrator access strictly, enforce strong authentication mechanisms (e.g., MFA), and monitor admin activities for suspicious behavior. Temporarily disabling the plugin or migrating to alternative solutions with better security postures is advisable. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regularly backing up multisite configurations and data will facilitate recovery if exploitation occurs. Organizations should also review and tighten the use of the unfiltered_html capability to limit exposure. Finally, monitoring web logs and user activity for unusual patterns can help detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-17T20:48:12.035Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6905841371a6fc4aff3da4ab

Added to database: 11/1/2025, 3:52:51 AM

Last enriched: 11/10/2025, 2:28:43 AM

Last updated: 12/16/2025, 6:35:45 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats