CVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a combination of the 'tag' and ‘title_tag’ parameters in all versions up to, and including, 2.17.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-12379 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the 'Shortcodes and extra features for Phlox theme' WordPress plugin developed by averta. This vulnerability affects all versions up to and including 2.17.13. The root cause is insufficient sanitization and escaping of user-supplied input in the 'tag' and 'title_tag' parameters, which are used during web page generation. Authenticated attackers with Contributor-level privileges or higher can exploit this flaw to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who visits the affected page. Since the vulnerability requires only low-level authenticated access, it lowers the barrier for exploitation compared to unauthenticated attacks. The injected scripts can be used to steal session cookies, perform actions on behalf of users, or deface websites. The CVSS v3.1 base score is 6.4, indicating a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk. The lack of official patches at the time of reporting necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites using the Phlox theme with the vulnerable plugin. Stored XSS can lead to unauthorized access to user sessions, data theft, and website defacement, undermining user trust and potentially violating GDPR requirements related to data protection and breach notification. Public-facing websites, e-commerce platforms, and portals handling sensitive user information are particularly at risk. Attackers exploiting this vulnerability could impersonate users, escalate privileges, or inject malicious content that spreads malware or phishing attacks. The requirement for authenticated access limits exposure somewhat but does not eliminate risk, as Contributor-level accounts are common in collaborative environments. The vulnerability could also be leveraged as a foothold for further attacks within an organization's network. Given the widespread use of WordPress in Europe, the threat could affect a broad range of sectors including government, education, healthcare, and commerce.
Mitigation Recommendations
To mitigate CVE-2025-12379, European organizations should first verify if their WordPress installations use the 'Shortcodes and extra features for Phlox theme' plugin and identify the version in use. Since no official patch links are provided, administrators should consider the following specific actions: (1) Temporarily restrict Contributor-level user capabilities to prevent exploitation until a patch is available. (2) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'tag' and 'title_tag' parameters. (3) Conduct a thorough audit of existing content for injected scripts and remove any suspicious code. (4) Educate content contributors about safe input practices and monitor user activity for unusual behavior. (5) Apply output encoding and sanitization at the application or server level if possible. (6) Monitor security advisories from the plugin vendor and WordPress community for updates or patches and apply them promptly once released. (7) Consider disabling or replacing the vulnerable plugin if immediate patching is not feasible. These targeted measures go beyond generic advice by focusing on the specific vectors and user roles involved in this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
Description
The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a combination of the 'tag' and ‘title_tag’ parameters in all versions up to, and including, 2.17.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-12379 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the 'Shortcodes and extra features for Phlox theme' WordPress plugin developed by averta. This vulnerability affects all versions up to and including 2.17.13. The root cause is insufficient sanitization and escaping of user-supplied input in the 'tag' and 'title_tag' parameters, which are used during web page generation. Authenticated attackers with Contributor-level privileges or higher can exploit this flaw to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user who visits the affected page. Since the vulnerability requires only low-level authenticated access, it lowers the barrier for exploitation compared to unauthenticated attacks. The injected scripts can be used to steal session cookies, perform actions on behalf of users, or deface websites. The CVSS v3.1 base score is 6.4, indicating a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk. The lack of official patches at the time of reporting necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites using the Phlox theme with the vulnerable plugin. Stored XSS can lead to unauthorized access to user sessions, data theft, and website defacement, undermining user trust and potentially violating GDPR requirements related to data protection and breach notification. Public-facing websites, e-commerce platforms, and portals handling sensitive user information are particularly at risk. Attackers exploiting this vulnerability could impersonate users, escalate privileges, or inject malicious content that spreads malware or phishing attacks. The requirement for authenticated access limits exposure somewhat but does not eliminate risk, as Contributor-level accounts are common in collaborative environments. The vulnerability could also be leveraged as a foothold for further attacks within an organization's network. Given the widespread use of WordPress in Europe, the threat could affect a broad range of sectors including government, education, healthcare, and commerce.
Mitigation Recommendations
To mitigate CVE-2025-12379, European organizations should first verify if their WordPress installations use the 'Shortcodes and extra features for Phlox theme' plugin and identify the version in use. Since no official patch links are provided, administrators should consider the following specific actions: (1) Temporarily restrict Contributor-level user capabilities to prevent exploitation until a patch is available. (2) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'tag' and 'title_tag' parameters. (3) Conduct a thorough audit of existing content for injected scripts and remove any suspicious code. (4) Educate content contributors about safe input practices and monitor user activity for unusual behavior. (5) Apply output encoding and sanitization at the application or server level if possible. (6) Monitor security advisories from the plugin vendor and WordPress community for updates or patches and apply them promptly once released. (7) Consider disabling or replacing the vulnerable plugin if immediate patching is not feasible. These targeted measures go beyond generic advice by focusing on the specific vectors and user roles involved in this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-28T00:38:54.310Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69625bacf2400df44e52a8df
Added to database: 1/10/2026, 2:01:16 PM
Last enriched: 1/10/2026, 2:15:55 PM
Last updated: 1/11/2026, 5:54:01 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0838: Buffer Overflow in UTT 进取 520W
HighCVE-2026-0837: Buffer Overflow in UTT 进取 520W
HighCVE-2026-0836: Buffer Overflow in UTT 进取 520W
HighCVE-2025-15505: Cross Site Scripting in Luxul XWR-600
MediumCVE-2026-0824: Cross Site Scripting in questdb ui
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.