CVE-2025-12160: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nmedia Simple User Registration
The Simple User Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpr_admin_msg' parameter in all versions up to, and including, 6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-12160 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Simple User Registration plugin for WordPress, developed by nmedia. The vulnerability exists due to improper neutralization of input during web page generation, specifically involving the 'wpr_admin_msg' parameter. This parameter is insufficiently sanitized and escaped before being rendered in web pages, allowing attackers to inject arbitrary JavaScript code. Because the vulnerability is stored, the malicious script persists on the server and executes whenever any user accesses the affected page, potentially compromising multiple users. The vulnerability affects all versions of the plugin up to and including version 6.6. The CVSS v3.1 score is 7.2 (high severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has a scope change (S:C), with low confidentiality and integrity impacts (C:L/I:L) but no availability impact (A:N). This means an unauthenticated remote attacker can exploit the vulnerability remotely without user interaction, potentially stealing sensitive information such as session cookies or performing unauthorized actions on behalf of users. No patches or fixes have been linked yet, and no known exploits are reported in the wild. The vulnerability was reserved on October 24, 2025, and published on November 21, 2025. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. Given the widespread use of WordPress and the popularity of user registration plugins, this vulnerability poses a significant risk to websites using this plugin for user management.
Potential Impact
The impact of CVE-2025-12160 is significant for organizations using the Simple User Registration plugin on WordPress sites. Exploitation allows attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to theft of session cookies, user credentials, or other sensitive information. Attackers can also perform actions on behalf of authenticated users, such as changing account details or escalating privileges if combined with other vulnerabilities. Since the vulnerability is stored, the malicious payload can affect multiple users over time, increasing the attack surface. The lack of authentication and user interaction requirements makes exploitation easier and more likely. For organizations, this can lead to data breaches, reputational damage, and compliance violations. Additionally, attackers could use the vulnerability as a foothold for further attacks within the network or to distribute malware. Given WordPress's extensive use worldwide, the vulnerability could affect a large number of websites, including e-commerce, corporate, and governmental sites, amplifying the potential damage.
Mitigation Recommendations
To mitigate CVE-2025-12160, organizations should: 1) Immediately audit their WordPress installations to identify if the Simple User Registration plugin is installed and determine the version in use. 2) Monitor the vendor's official channels for patches or updates addressing this vulnerability and apply them promptly once available. 3) In the absence of an official patch, consider temporarily disabling or uninstalling the plugin to eliminate the attack vector. 4) Implement Web Application Firewalls (WAFs) with rules specifically designed to detect and block XSS payloads targeting the 'wpr_admin_msg' parameter or similar vectors. 5) Conduct input validation and output encoding on all user-supplied data within custom code or themes to reduce XSS risks. 6) Educate site administrators and users about the risks of XSS and encourage the use of security best practices such as least privilege and strong authentication. 7) Regularly scan websites for malicious scripts or anomalies that could indicate exploitation attempts. 8) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. These targeted actions go beyond generic advice and focus on immediate risk reduction and long-term prevention.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, India, Brazil
CVE-2025-12160: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nmedia Simple User Registration
Description
The Simple User Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpr_admin_msg' parameter in all versions up to, and including, 6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12160 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Simple User Registration plugin for WordPress, developed by nmedia. The vulnerability exists due to improper neutralization of input during web page generation, specifically involving the 'wpr_admin_msg' parameter. This parameter is insufficiently sanitized and escaped before being rendered in web pages, allowing attackers to inject arbitrary JavaScript code. Because the vulnerability is stored, the malicious script persists on the server and executes whenever any user accesses the affected page, potentially compromising multiple users. The vulnerability affects all versions of the plugin up to and including version 6.6. The CVSS v3.1 score is 7.2 (high severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has a scope change (S:C), with low confidentiality and integrity impacts (C:L/I:L) but no availability impact (A:N). This means an unauthenticated remote attacker can exploit the vulnerability remotely without user interaction, potentially stealing sensitive information such as session cookies or performing unauthorized actions on behalf of users. No patches or fixes have been linked yet, and no known exploits are reported in the wild. The vulnerability was reserved on October 24, 2025, and published on November 21, 2025. The CWE classification is CWE-79, which corresponds to improper neutralization of input leading to XSS. Given the widespread use of WordPress and the popularity of user registration plugins, this vulnerability poses a significant risk to websites using this plugin for user management.
Potential Impact
The impact of CVE-2025-12160 is significant for organizations using the Simple User Registration plugin on WordPress sites. Exploitation allows attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to theft of session cookies, user credentials, or other sensitive information. Attackers can also perform actions on behalf of authenticated users, such as changing account details or escalating privileges if combined with other vulnerabilities. Since the vulnerability is stored, the malicious payload can affect multiple users over time, increasing the attack surface. The lack of authentication and user interaction requirements makes exploitation easier and more likely. For organizations, this can lead to data breaches, reputational damage, and compliance violations. Additionally, attackers could use the vulnerability as a foothold for further attacks within the network or to distribute malware. Given WordPress's extensive use worldwide, the vulnerability could affect a large number of websites, including e-commerce, corporate, and governmental sites, amplifying the potential damage.
Mitigation Recommendations
To mitigate CVE-2025-12160, organizations should: 1) Immediately audit their WordPress installations to identify if the Simple User Registration plugin is installed and determine the version in use. 2) Monitor the vendor's official channels for patches or updates addressing this vulnerability and apply them promptly once available. 3) In the absence of an official patch, consider temporarily disabling or uninstalling the plugin to eliminate the attack vector. 4) Implement Web Application Firewalls (WAFs) with rules specifically designed to detect and block XSS payloads targeting the 'wpr_admin_msg' parameter or similar vectors. 5) Conduct input validation and output encoding on all user-supplied data within custom code or themes to reduce XSS risks. 6) Educate site administrators and users about the risks of XSS and encourage the use of security best practices such as least privilege and strong authentication. 7) Regularly scan websites for malicious scripts or anomalies that could indicate exploitation attempts. 8) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. These targeted actions go beyond generic advice and focus on immediate risk reduction and long-term prevention.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T13:24:29.288Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692032ceb6fc887540a02d44
Added to database: 11/21/2025, 9:37:18 AM
Last enriched: 2/27/2026, 8:13:43 PM
Last updated: 3/22/2026, 5:02:14 PM
Views: 181
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.