Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in michael_j_reid Weekly Planner

0
Medium
VulnerabilityCVE-2025-12186cvecve-2025-12186cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 06:07:17 UTC)
Source: CVE Database V5
Vendor/Project: michael_j_reid
Product: Weekly Planner

Description

CVE-2025-12186 is a stored cross-site scripting (XSS) vulnerability in the Weekly Planner WordPress plugin by michael_j_reid, affecting all versions up to 1. 0. It allows authenticated users with administrator-level permissions or higher to inject malicious scripts via the admin settings. The vulnerability specifically impacts multisite WordPress installations or those with unfiltered_html disabled. Exploitation requires high privileges and no user interaction but can lead to limited confidentiality and integrity impacts. The CVSS score is 4. 4 (medium severity), reflecting the need for authentication and high attack complexity. No known exploits are currently in the wild. European organizations using this plugin in multisite environments should prioritize patching or mitigating this issue to prevent potential script injection attacks that could compromise user sessions or site integrity.

AI-Powered Analysis

AILast updated: 12/05/2025, 06:46:33 UTC

Technical Analysis

CVE-2025-12186 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Weekly Planner plugin for WordPress developed by michael_j_reid. The flaw arises from improper input sanitization and insufficient output escaping in the plugin's admin settings interface, which allows authenticated administrators or higher privileged users to inject arbitrary JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the affected pages, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability specifically affects multisite WordPress installations or those where the unfiltered_html capability is disabled, limiting the attack surface to environments with stricter content filtering. The CVSS 3.1 base score of 4.4 reflects a medium severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), requiring high privileges (PR:H), no user interaction (UI:N), and a scope change (S:C) with low confidentiality and integrity impact (C:L/I:L) and no availability impact (A:N). There are no patches or known exploits publicly available at this time, but the vulnerability is published and should be addressed promptly to prevent potential exploitation.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on the confidentiality and integrity of data within WordPress multisite environments using the Weekly Planner plugin. Attackers with administrator privileges could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, unauthorized actions, or data leakage. Although the vulnerability requires high privileges, insider threats or compromised admin accounts could exploit it to escalate damage. The absence of availability impact reduces the risk of service disruption, but the integrity and confidentiality risks remain significant, especially for organizations handling sensitive data or operating critical websites. Given the widespread use of WordPress in Europe, particularly in sectors like education, government, and small to medium enterprises, this vulnerability could facilitate targeted attacks or lateral movement within compromised networks.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify multisite environments using the Weekly Planner plugin. Since no official patch is currently available, administrators should consider disabling or removing the plugin until a fix is released. Restricting administrator access and enforcing strong authentication mechanisms can reduce the risk of exploitation. Additionally, enabling web application firewalls (WAFs) with rules to detect and block suspicious script injections in admin settings can provide temporary protection. Organizations should also review and tighten content filtering settings, ensuring unfiltered_html is enabled only where absolutely necessary. Regular monitoring of logs for unusual admin activity and user behavior analytics can help detect early signs of exploitation. Finally, maintaining an incident response plan tailored to web application attacks will improve readiness in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T19:46:11.687Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327c01f88dbe026c7c158b

Added to database: 12/5/2025, 6:30:25 AM

Last enriched: 12/5/2025, 6:46:33 AM

Last updated: 12/5/2025, 1:27:00 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats