CVE-2025-12186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in michael_j_reid Weekly Planner
CVE-2025-12186 is a stored cross-site scripting (XSS) vulnerability in the Weekly Planner WordPress plugin by michael_j_reid, affecting all versions up to 1. 0. It allows authenticated users with administrator-level permissions or higher to inject malicious scripts via the admin settings. The vulnerability specifically impacts multisite WordPress installations or those with unfiltered_html disabled. Exploitation requires high privileges and no user interaction but can lead to limited confidentiality and integrity impacts. The CVSS score is 4. 4 (medium severity), reflecting the need for authentication and high attack complexity. No known exploits are currently in the wild. European organizations using this plugin in multisite environments should prioritize patching or mitigating this issue to prevent potential script injection attacks that could compromise user sessions or site integrity.
AI Analysis
Technical Summary
CVE-2025-12186 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Weekly Planner plugin for WordPress developed by michael_j_reid. The flaw arises from improper input sanitization and insufficient output escaping in the plugin's admin settings interface, which allows authenticated administrators or higher privileged users to inject arbitrary JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the affected pages, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability specifically affects multisite WordPress installations or those where the unfiltered_html capability is disabled, limiting the attack surface to environments with stricter content filtering. The CVSS 3.1 base score of 4.4 reflects a medium severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), requiring high privileges (PR:H), no user interaction (UI:N), and a scope change (S:C) with low confidentiality and integrity impact (C:L/I:L) and no availability impact (A:N). There are no patches or known exploits publicly available at this time, but the vulnerability is published and should be addressed promptly to prevent potential exploitation.
Potential Impact
For European organizations, the impact of this vulnerability is primarily on the confidentiality and integrity of data within WordPress multisite environments using the Weekly Planner plugin. Attackers with administrator privileges could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, unauthorized actions, or data leakage. Although the vulnerability requires high privileges, insider threats or compromised admin accounts could exploit it to escalate damage. The absence of availability impact reduces the risk of service disruption, but the integrity and confidentiality risks remain significant, especially for organizations handling sensitive data or operating critical websites. Given the widespread use of WordPress in Europe, particularly in sectors like education, government, and small to medium enterprises, this vulnerability could facilitate targeted attacks or lateral movement within compromised networks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify multisite environments using the Weekly Planner plugin. Since no official patch is currently available, administrators should consider disabling or removing the plugin until a fix is released. Restricting administrator access and enforcing strong authentication mechanisms can reduce the risk of exploitation. Additionally, enabling web application firewalls (WAFs) with rules to detect and block suspicious script injections in admin settings can provide temporary protection. Organizations should also review and tighten content filtering settings, ensuring unfiltered_html is enabled only where absolutely necessary. Regular monitoring of logs for unusual admin activity and user behavior analytics can help detect early signs of exploitation. Finally, maintaining an incident response plan tailored to web application attacks will improve readiness in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in michael_j_reid Weekly Planner
Description
CVE-2025-12186 is a stored cross-site scripting (XSS) vulnerability in the Weekly Planner WordPress plugin by michael_j_reid, affecting all versions up to 1. 0. It allows authenticated users with administrator-level permissions or higher to inject malicious scripts via the admin settings. The vulnerability specifically impacts multisite WordPress installations or those with unfiltered_html disabled. Exploitation requires high privileges and no user interaction but can lead to limited confidentiality and integrity impacts. The CVSS score is 4. 4 (medium severity), reflecting the need for authentication and high attack complexity. No known exploits are currently in the wild. European organizations using this plugin in multisite environments should prioritize patching or mitigating this issue to prevent potential script injection attacks that could compromise user sessions or site integrity.
AI-Powered Analysis
Technical Analysis
CVE-2025-12186 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Weekly Planner plugin for WordPress developed by michael_j_reid. The flaw arises from improper input sanitization and insufficient output escaping in the plugin's admin settings interface, which allows authenticated administrators or higher privileged users to inject arbitrary JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the affected pages, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability specifically affects multisite WordPress installations or those where the unfiltered_html capability is disabled, limiting the attack surface to environments with stricter content filtering. The CVSS 3.1 base score of 4.4 reflects a medium severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), requiring high privileges (PR:H), no user interaction (UI:N), and a scope change (S:C) with low confidentiality and integrity impact (C:L/I:L) and no availability impact (A:N). There are no patches or known exploits publicly available at this time, but the vulnerability is published and should be addressed promptly to prevent potential exploitation.
Potential Impact
For European organizations, the impact of this vulnerability is primarily on the confidentiality and integrity of data within WordPress multisite environments using the Weekly Planner plugin. Attackers with administrator privileges could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, unauthorized actions, or data leakage. Although the vulnerability requires high privileges, insider threats or compromised admin accounts could exploit it to escalate damage. The absence of availability impact reduces the risk of service disruption, but the integrity and confidentiality risks remain significant, especially for organizations handling sensitive data or operating critical websites. Given the widespread use of WordPress in Europe, particularly in sectors like education, government, and small to medium enterprises, this vulnerability could facilitate targeted attacks or lateral movement within compromised networks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify multisite environments using the Weekly Planner plugin. Since no official patch is currently available, administrators should consider disabling or removing the plugin until a fix is released. Restricting administrator access and enforcing strong authentication mechanisms can reduce the risk of exploitation. Additionally, enabling web application firewalls (WAFs) with rules to detect and block suspicious script injections in admin settings can provide temporary protection. Organizations should also review and tighten content filtering settings, ensuring unfiltered_html is enabled only where absolutely necessary. Regular monitoring of logs for unusual admin activity and user behavior analytics can help detect early signs of exploitation. Finally, maintaining an incident response plan tailored to web application attacks will improve readiness in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T19:46:11.687Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327c01f88dbe026c7c158b
Added to database: 12/5/2025, 6:30:25 AM
Last enriched: 12/5/2025, 6:46:33 AM
Last updated: 12/5/2025, 1:27:00 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-6966: CWE-476 NULL Pointer Dereference in Canonical python-apt
MediumCVE-2025-13620: CWE-862 Missing Authorization in roxnor Wp Social Login and Register Social Counter
MediumCVE-2025-66200: mod_userdir+suexec bypass via AllowOverride FileInfo in Apache Software Foundation Apache HTTP Server
HighCVE-2025-65082: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache HTTP Server
UnknownAisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.