CVE-2025-12163: CWE-434 Unrestricted Upload of File with Dangerous Type in omnipressteam Omnipress
The Omnipress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
AI Analysis
Technical Summary
CVE-2025-12163 is a stored cross-site scripting (XSS) vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Omnipress plugin for WordPress. This vulnerability arises because the plugin fails to properly sanitize and escape SVG file uploads, allowing authenticated users with Author-level permissions or higher to upload SVG files containing embedded malicious JavaScript. When other users or administrators access pages displaying these SVG files, the embedded scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress site. The attack vector is remote and network-based, requiring only authenticated access but no further user interaction. The vulnerability affects all versions of Omnipress up to 1.6.3, with no patches currently available. The CVSS 3.1 score of 6.4 reflects a medium severity, considering the ease of exploitation (low complexity), requirement for privileges (Author-level), and the impact on confidentiality and integrity but no impact on availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple authors or contributors. The stored nature of the XSS makes it persistent and potentially more damaging than reflected XSS. Attackers could leverage this to steal cookies, perform actions on behalf of users, or spread malware within the site environment.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information, session hijacking, and potential defacement or manipulation of website content. Since WordPress is widely used across Europe for corporate, governmental, and media websites, exploitation could undermine trust and cause reputational damage. The requirement for Author-level access limits the initial attack surface to insiders or compromised accounts, but once exploited, the impact can extend to all users visiting the affected pages. Confidentiality and integrity of user data and site content are at risk, which could lead to data breaches or compliance violations under GDPR. The absence of availability impact means service disruption is unlikely, but the persistent nature of the XSS could facilitate long-term unauthorized access or data exfiltration. Organizations relying on Omnipress for publishing or content management should consider the risk of lateral movement if attackers escalate privileges after initial exploitation.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions in WordPress to ensure that only trusted users have Author-level or higher access. Restrict SVG file uploads or disable them entirely if not required. Implement strict input validation and sanitization on file uploads, especially for SVGs, using security-focused plugins or custom filters that remove scripts from SVG content. Monitor and review uploaded files regularly for suspicious content. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Keep WordPress core and all plugins updated, and watch for official patches from Omnipress developers. Consider deploying Web Application Firewalls (WAFs) that can detect and block XSS payloads. Educate content authors about the risks of uploading untrusted files and enforce multi-factor authentication to reduce account compromise risk. Finally, prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12163: CWE-434 Unrestricted Upload of File with Dangerous Type in omnipressteam Omnipress
Description
The Omnipress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
AI-Powered Analysis
Technical Analysis
CVE-2025-12163 is a stored cross-site scripting (XSS) vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Omnipress plugin for WordPress. This vulnerability arises because the plugin fails to properly sanitize and escape SVG file uploads, allowing authenticated users with Author-level permissions or higher to upload SVG files containing embedded malicious JavaScript. When other users or administrators access pages displaying these SVG files, the embedded scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress site. The attack vector is remote and network-based, requiring only authenticated access but no further user interaction. The vulnerability affects all versions of Omnipress up to 1.6.3, with no patches currently available. The CVSS 3.1 score of 6.4 reflects a medium severity, considering the ease of exploitation (low complexity), requirement for privileges (Author-level), and the impact on confidentiality and integrity but no impact on availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple authors or contributors. The stored nature of the XSS makes it persistent and potentially more damaging than reflected XSS. Attackers could leverage this to steal cookies, perform actions on behalf of users, or spread malware within the site environment.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive information, session hijacking, and potential defacement or manipulation of website content. Since WordPress is widely used across Europe for corporate, governmental, and media websites, exploitation could undermine trust and cause reputational damage. The requirement for Author-level access limits the initial attack surface to insiders or compromised accounts, but once exploited, the impact can extend to all users visiting the affected pages. Confidentiality and integrity of user data and site content are at risk, which could lead to data breaches or compliance violations under GDPR. The absence of availability impact means service disruption is unlikely, but the persistent nature of the XSS could facilitate long-term unauthorized access or data exfiltration. Organizations relying on Omnipress for publishing or content management should consider the risk of lateral movement if attackers escalate privileges after initial exploitation.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions in WordPress to ensure that only trusted users have Author-level or higher access. Restrict SVG file uploads or disable them entirely if not required. Implement strict input validation and sanitization on file uploads, especially for SVGs, using security-focused plugins or custom filters that remove scripts from SVG content. Monitor and review uploaded files regularly for suspicious content. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Keep WordPress core and all plugins updated, and watch for official patches from Omnipress developers. Consider deploying Web Application Firewalls (WAFs) that can detect and block XSS payloads. Educate content authors about the risks of uploading untrusted files and enforce multi-factor authentication to reduce account compromise risk. Finally, prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T14:04:10.223Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327172f88dbe026c779915
Added to database: 12/5/2025, 5:45:22 AM
Last enriched: 12/12/2025, 7:13:49 AM
Last updated: 2/6/2026, 1:01:49 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.