CVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a combination of the 'tag' and ‘title_tag’ parameters in all versions up to, and including, 2.17.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-12379 is a stored Cross-Site Scripting vulnerability identified in the 'Shortcodes and extra features for Phlox theme' WordPress plugin developed by averta. The vulnerability arises from improper neutralization of input during web page generation, specifically through insufficient sanitization and output escaping of the 'tag' and 'title_tag' parameters. This flaw allows authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious scripts are stored persistently, they execute every time any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of users. The vulnerability affects all versions up to and including 2.17.13. The CVSS v3.1 score is 6.4, reflecting medium severity with network attack vector, low attack complexity, requiring privileges (Contributor or higher), no user interaction, and a scope change. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in late 2025 and published in early 2026. The plugin is commonly used in WordPress sites employing the Phlox theme, which is popular among European small and medium enterprises and bloggers. The vulnerability's exploitation could lead to partial confidentiality and integrity loss but does not affect availability. The lack of output escaping and input sanitization is a common CWE-79 weakness, emphasizing the need for secure coding practices in plugin development.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to websites using the Phlox theme with the vulnerable plugin. Exploitation can lead to session hijacking, unauthorized actions on behalf of users, theft of sensitive information such as authentication tokens, and potential defacement or redirection attacks. Organizations relying on WordPress sites for customer engagement, e-commerce, or internal communications may suffer reputational damage, data breaches, and compliance violations under GDPR if personal data is compromised. The requirement for Contributor-level access reduces the attack surface but does not eliminate risk, especially in environments with multiple content editors or where account compromise is possible. The medium severity score indicates a moderate but actionable threat. Since the vulnerability does not require user interaction, automated exploitation is feasible once an attacker gains the necessary privileges. The absence of known exploits in the wild suggests a window for proactive mitigation. European SMEs and public sector entities using WordPress extensively are particularly vulnerable due to widespread adoption and sometimes limited security resources.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from averta for the 'Shortcodes and extra features for Phlox theme' plugin as soon as they are released. 2. Until patches are available, restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. 3. Implement Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads, especially targeting the 'tag' and 'title_tag' parameters. 4. Conduct regular security audits and code reviews of WordPress plugins and themes to identify and remediate insecure input handling. 5. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected sites. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content validation policies. 7. Use security plugins that provide XSS protection and input sanitization enhancements. 8. Monitor logs for unusual activity related to page edits or script injections. 9. Consider temporarily disabling the vulnerable plugin if immediate patching is not possible and the plugin is not critical. 10. Maintain regular backups to enable recovery in case of successful exploitation.
Affected Countries
Germany, United Kingdom, France, Italy, Netherlands, Spain, Poland, Sweden
CVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
Description
The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a combination of the 'tag' and ‘title_tag’ parameters in all versions up to, and including, 2.17.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-12379 is a stored Cross-Site Scripting vulnerability identified in the 'Shortcodes and extra features for Phlox theme' WordPress plugin developed by averta. The vulnerability arises from improper neutralization of input during web page generation, specifically through insufficient sanitization and output escaping of the 'tag' and 'title_tag' parameters. This flaw allows authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious scripts are stored persistently, they execute every time any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of users. The vulnerability affects all versions up to and including 2.17.13. The CVSS v3.1 score is 6.4, reflecting medium severity with network attack vector, low attack complexity, requiring privileges (Contributor or higher), no user interaction, and a scope change. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in late 2025 and published in early 2026. The plugin is commonly used in WordPress sites employing the Phlox theme, which is popular among European small and medium enterprises and bloggers. The vulnerability's exploitation could lead to partial confidentiality and integrity loss but does not affect availability. The lack of output escaping and input sanitization is a common CWE-79 weakness, emphasizing the need for secure coding practices in plugin development.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to websites using the Phlox theme with the vulnerable plugin. Exploitation can lead to session hijacking, unauthorized actions on behalf of users, theft of sensitive information such as authentication tokens, and potential defacement or redirection attacks. Organizations relying on WordPress sites for customer engagement, e-commerce, or internal communications may suffer reputational damage, data breaches, and compliance violations under GDPR if personal data is compromised. The requirement for Contributor-level access reduces the attack surface but does not eliminate risk, especially in environments with multiple content editors or where account compromise is possible. The medium severity score indicates a moderate but actionable threat. Since the vulnerability does not require user interaction, automated exploitation is feasible once an attacker gains the necessary privileges. The absence of known exploits in the wild suggests a window for proactive mitigation. European SMEs and public sector entities using WordPress extensively are particularly vulnerable due to widespread adoption and sometimes limited security resources.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from averta for the 'Shortcodes and extra features for Phlox theme' plugin as soon as they are released. 2. Until patches are available, restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. 3. Implement Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads, especially targeting the 'tag' and 'title_tag' parameters. 4. Conduct regular security audits and code reviews of WordPress plugins and themes to identify and remediate insecure input handling. 5. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected sites. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content validation policies. 7. Use security plugins that provide XSS protection and input sanitization enhancements. 8. Monitor logs for unusual activity related to page edits or script injections. 9. Consider temporarily disabling the vulnerable plugin if immediate patching is not possible and the plugin is not critical. 10. Maintain regular backups to enable recovery in case of successful exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-28T00:38:54.310Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69625bacf2400df44e52a8df
Added to database: 1/10/2026, 2:01:16 PM
Last enriched: 1/18/2026, 7:38:42 AM
Last updated: 2/6/2026, 9:04:11 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25631: CWE-20: Improper Input Validation in n8n-io n8n
MediumCVE-2026-25592: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in microsoft semantic-kernel
CriticalCVE-2026-2066: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2026-25634: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.