Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12473: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rometheme RTMKit

0
Medium
VulnerabilityCVE-2025-12473cvecve-2025-12473cwe-79
Published: Wed Mar 11 2026 (03/11/2026, 01:22:05 UTC)
Source: CVE Database V5
Vendor/Project: rometheme
Product: RTMKit

Description

CVE-2025-12473 is a reflected cross-site scripting (XSS) vulnerability in the RTMKit WordPress plugin by rometheme, affecting all versions up to 1. 6. 8. The flaw arises from improper input sanitization and output escaping of the 'themebuilder' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a site administrator into clicking a crafted link, leading to script execution in the admin context. The vulnerability has a CVSS score of 6. 1 (medium severity) with a scope change and impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using RTMKit should prioritize patching or applying mitigations to prevent potential session hijacking, privilege escalation, or unauthorized actions. Countries with significant WordPress usage and high adoption of rometheme products, including the United States, Germany, India, Brazil, and the United Kingdom, are most at risk.

AI-Powered Analysis

AILast updated: 03/11/2026, 02:14:33 UTC

Technical Analysis

CVE-2025-12473 is a reflected cross-site scripting vulnerability identified in the RTMKit plugin for WordPress, developed by rometheme. The vulnerability exists due to improper neutralization of input during web page generation, specifically in the handling of the 'themebuilder' parameter. All versions up to and including 1.6.8 are affected. The root cause is insufficient input sanitization and lack of proper output escaping, which allows an attacker to inject arbitrary JavaScript code into pages viewed by administrators. Since the attack vector is reflected XSS, it requires an attacker to craft a malicious URL containing the payload and trick a site administrator into clicking it. Upon execution, the injected script runs in the context of the administrator's browser session, potentially leading to theft of session cookies, unauthorized actions, or privilege escalation. The vulnerability has a CVSS 3.1 base score of 6.1, indicating medium severity. The vector metrics show that the attack can be performed remotely without privileges but requires user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is unaffected. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the high privileges of the targeted users (administrators).

Potential Impact

The primary impact of CVE-2025-12473 is on the confidentiality and integrity of WordPress sites using the RTMKit plugin. Successful exploitation can lead to session hijacking, allowing attackers to impersonate administrators and gain full control over the site. This can result in unauthorized content modifications, installation of backdoors, or further malware distribution. The reflected nature of the XSS requires social engineering, but once successful, it can compromise site security and user trust. Organizations relying on RTMKit for theme management or customization are at risk of targeted attacks, especially if administrators frequently access the plugin interface. Although availability is not directly impacted, the broader consequences of compromised administrative accounts can lead to site defacement or downtime. The vulnerability's medium severity score reflects the balance between ease of exploitation and the need for user interaction. However, the scope change indicates that the impact extends beyond the plugin itself, potentially affecting the entire WordPress installation and its users.

Mitigation Recommendations

1. Immediate patching: Organizations should monitor rometheme's official channels for updates and apply patches as soon as they become available. 2. Input validation and output encoding: Until patches are released, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'themebuilder' parameter. 3. Restrict administrative access: Limit access to the WordPress admin panel to trusted IP addresses and enforce multi-factor authentication (MFA) to reduce the risk of compromised credentials. 4. User awareness training: Educate administrators about the risks of clicking on unsolicited or suspicious links, especially those related to plugin parameters. 5. Regular security audits: Conduct periodic vulnerability scans and code reviews of plugins to identify similar issues proactively. 6. Disable or remove unused plugins: If RTMKit is not essential, consider disabling or uninstalling it to eliminate the attack surface. 7. Content Security Policy (CSP): Implement CSP headers to restrict the execution of unauthorized scripts, mitigating the impact of XSS attacks. 8. Monitor logs: Enable detailed logging and monitor for unusual administrator activity or access patterns that may indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-29T15:57:04.882Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0cc972f860ef943fb1c09

Added to database: 3/11/2026, 1:59:51 AM

Last enriched: 3/11/2026, 2:14:33 AM

Last updated: 3/11/2026, 3:03:28 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses