Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12066: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in etruel WP Delete Post Copies

0
Medium
VulnerabilityCVE-2025-12066cvecve-2025-12066cwe-79
Published: Fri Nov 21 2025 (11/21/2025, 09:27:00 UTC)
Source: CVE Database V5
Vendor/Project: etruel
Product: WP Delete Post Copies

Description

CVE-2025-12066 is a stored cross-site scripting (XSS) vulnerability in the WP Delete Post Copies WordPress plugin affecting all versions up to 6. 0. 2. It allows authenticated users with administrator-level permissions or higher to inject malicious scripts via admin settings. The vulnerability specifically impacts multi-site WordPress installations or those with unfiltered_html disabled. Exploitation requires high privileges and no user interaction but has a medium CVSS score due to limited impact scope. Successful exploitation can lead to the execution of arbitrary scripts in the context of other users, potentially compromising confidentiality and integrity. No known public exploits exist yet, and no patches have been released. European organizations using this plugin in multi-site environments should prioritize mitigation to prevent potential abuse. Mitigation involves restricting admin access, monitoring for suspicious admin activity, and applying any future patches promptly.

AI-Powered Analysis

AILast updated: 11/28/2025, 10:57:06 UTC

Technical Analysis

CVE-2025-12066 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the WP Delete Post Copies plugin for WordPress. This vulnerability affects all versions up to and including 6.0.2 and arises from insufficient input sanitization and output escaping in the plugin's admin settings interface. Specifically, authenticated users with administrator-level permissions or higher can inject arbitrary JavaScript code into pages generated by the plugin. The injected scripts execute whenever any user accesses the affected pages, potentially allowing attackers to hijack sessions, steal sensitive data, or perform actions on behalf of other users. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the scope of affected environments. Exploitation requires high privileges (administrator or above) and does not require user interaction, but the attack vector is network-based with high attack complexity. The CVSS v3.1 base score is 4.4 (medium severity), reflecting limited confidentiality and integrity impact and no availability impact. No public exploits have been reported, and no official patches are currently available, though the vulnerability has been publicly disclosed and assigned a CVE identifier. The vulnerability's presence in multi-site environments is significant because such setups often serve multiple sites or tenants, increasing the potential impact if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-12066 depends largely on the use of the WP Delete Post Copies plugin within multi-site WordPress installations. Organizations running multi-site WordPress environments with this plugin are at risk of stored XSS attacks that can compromise the confidentiality and integrity of user data and administrative functions. Attackers with administrator privileges could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, credential theft, or unauthorized actions performed under the guise of legitimate users. While the vulnerability does not affect availability, the breach of trust and data integrity can have reputational and compliance consequences, especially under GDPR regulations. The requirement for high privileges limits the risk to insider threats or compromised administrator accounts, but the multi-site context increases the potential blast radius. European entities with extensive WordPress deployments, such as media companies, educational institutions, and government agencies, may face increased risks if they rely on this plugin without mitigation. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.

Mitigation Recommendations

1. Restrict administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of privilege abuse. 2. Monitor administrative activities and audit logs for unusual changes in plugin settings or suspicious behavior indicative of attempted script injection. 3. Disable or avoid using the WP Delete Post Copies plugin in multi-site WordPress environments until a security patch is released. 4. If the plugin is essential, consider isolating multi-site installations or limiting the use of unfiltered_html capabilities to trusted users only. 5. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. 6. Keep WordPress core and all plugins updated regularly and subscribe to security advisories from the plugin vendor and WordPress security communities. 7. Prepare incident response plans to quickly address any detected exploitation attempts. 8. Conduct regular security assessments and penetration tests focusing on administrative interfaces and multi-site configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-22T13:16:05.990Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692032ceb6fc887540a02d40

Added to database: 11/21/2025, 9:37:18 AM

Last enriched: 11/28/2025, 10:57:06 AM

Last updated: 1/7/2026, 4:52:11 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats