CVE-2025-12124: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kevindees FitVids for WordPress
The FitVids for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-12124 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the FitVids for WordPress plugin maintained by kevindees. The vulnerability exists due to improper input sanitization and output escaping in the plugin’s admin settings interface, allowing malicious scripts to be stored and later executed in the context of users visiting affected pages. This flaw affects all versions up to and including 4.0.1 and is exploitable only in multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts HTML content filtering. The attack vector requires an authenticated user with administrator-level permissions or higher to inject the malicious payload, meaning the attacker must already have significant access to the WordPress backend. Once injected, the malicious script executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other client-side attacks. The vulnerability does not require user interaction beyond visiting the affected page and does not impact availability. The CVSS 3.1 base score is 4.4, reflecting a network attack vector with high attack complexity and privileges required, impacting confidentiality and integrity to a limited extent. No known exploits have been reported in the wild, and no official patches or updates have been linked yet. The vulnerability was publicly disclosed on December 5, 2025, with Wordfence as the assigner.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to multi-site WordPress deployments using the FitVids plugin. Since exploitation requires administrator-level access, the threat is more about post-compromise persistence and lateral movement within the WordPress environment rather than initial breach. Successful exploitation could lead to theft of session cookies, defacement, or injection of malicious content affecting site visitors, potentially damaging brand reputation and user trust. Confidential data exposure risk is limited but present due to possible session hijacking. The impact is heightened in organizations relying on WordPress multi-site setups for managing multiple domains or sub-sites, common in media, education, and government sectors across Europe. The lack of known exploits reduces immediate risk, but the vulnerability could be weaponized in targeted attacks. Additionally, organizations with strict content filtering policies disabling unfiltered_html are more vulnerable. The threat could also facilitate further attacks if combined with other vulnerabilities or social engineering.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify multi-site installations running the FitVids plugin up to version 4.0.1. Until an official patch is released, administrators should restrict plugin usage or disable it in multi-site contexts. Review and harden administrator account security by enforcing strong authentication, limiting admin privileges, and monitoring for suspicious activity. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections in admin settings. Enable Content Security Policy (CSP) headers to reduce the impact of injected scripts. Regularly back up WordPress sites and test restoration procedures. Educate administrators about the risks of injecting untrusted content in plugin settings. Monitor security advisories for updates or patches from the plugin vendor. Consider isolating multi-site installations or migrating to single-site setups if feasible to reduce attack surface. Finally, conduct penetration testing focused on stored XSS vectors in admin interfaces.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12124: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kevindees FitVids for WordPress
Description
The FitVids for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-12124 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the FitVids for WordPress plugin maintained by kevindees. The vulnerability exists due to improper input sanitization and output escaping in the plugin’s admin settings interface, allowing malicious scripts to be stored and later executed in the context of users visiting affected pages. This flaw affects all versions up to and including 4.0.1 and is exploitable only in multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts HTML content filtering. The attack vector requires an authenticated user with administrator-level permissions or higher to inject the malicious payload, meaning the attacker must already have significant access to the WordPress backend. Once injected, the malicious script executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other client-side attacks. The vulnerability does not require user interaction beyond visiting the affected page and does not impact availability. The CVSS 3.1 base score is 4.4, reflecting a network attack vector with high attack complexity and privileges required, impacting confidentiality and integrity to a limited extent. No known exploits have been reported in the wild, and no official patches or updates have been linked yet. The vulnerability was publicly disclosed on December 5, 2025, with Wordfence as the assigner.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to multi-site WordPress deployments using the FitVids plugin. Since exploitation requires administrator-level access, the threat is more about post-compromise persistence and lateral movement within the WordPress environment rather than initial breach. Successful exploitation could lead to theft of session cookies, defacement, or injection of malicious content affecting site visitors, potentially damaging brand reputation and user trust. Confidential data exposure risk is limited but present due to possible session hijacking. The impact is heightened in organizations relying on WordPress multi-site setups for managing multiple domains or sub-sites, common in media, education, and government sectors across Europe. The lack of known exploits reduces immediate risk, but the vulnerability could be weaponized in targeted attacks. Additionally, organizations with strict content filtering policies disabling unfiltered_html are more vulnerable. The threat could also facilitate further attacks if combined with other vulnerabilities or social engineering.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify multi-site installations running the FitVids plugin up to version 4.0.1. Until an official patch is released, administrators should restrict plugin usage or disable it in multi-site contexts. Review and harden administrator account security by enforcing strong authentication, limiting admin privileges, and monitoring for suspicious activity. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections in admin settings. Enable Content Security Policy (CSP) headers to reduce the impact of injected scripts. Regularly back up WordPress sites and test restoration procedures. Educate administrators about the risks of injecting untrusted content in plugin settings. Monitor security advisories for updates or patches from the plugin vendor. Consider isolating multi-site installations or migrating to single-site setups if feasible to reduce attack surface. Finally, conduct penetration testing focused on stored XSS vectors in admin interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-23T18:24:25.580Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327172f88dbe026c779901
Added to database: 12/5/2025, 5:45:22 AM
Last enriched: 12/5/2025, 6:05:20 AM
Last updated: 12/7/2025, 4:08:05 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS
MediumCVE-2025-14182: Path Traversal in Sobey Media Convergence System
MediumCVE-2025-14141: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14140: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14139: Buffer Overflow in UTT 进取 520W
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.