Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12484: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers

0
High
VulnerabilityCVE-2025-12484cvecve-2025-12484cwe-79
Published: Wed Nov 19 2025 (11/19/2025, 07:46:07 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers

Description

The Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple social media username parameters in all versions up to, and including, 1.12.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 11/19/2025, 08:08:09 UTC

Technical Analysis

CVE-2025-12484 is a stored Cross-Site Scripting (XSS) vulnerability identified in the 'Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers' WordPress plugin, affecting all versions up to and including 1.12.19. The root cause is insufficient sanitization and escaping of user-supplied input, specifically multiple social media username parameters, during web page generation. This allows an unauthenticated attacker to inject arbitrary JavaScript code that is stored persistently and executed in the browsers of any users who visit the affected pages. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change with partial confidentiality and integrity impacts but no availability impact. Exploitation could lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of users. No patches or exploit code are currently publicly available, but the vulnerability is published and should be considered exploitable. The plugin is widely used for marketing and engagement purposes on WordPress sites, making it a valuable target for attackers seeking to compromise visitor trust or steal sensitive information. The vulnerability affects all versions, indicating a systemic issue in input handling within the plugin's codebase.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for businesses relying on WordPress-based marketing and promotional activities using the affected plugin. Exploitation could lead to unauthorized access to user sessions, theft of personal data, and reputational damage due to compromised website integrity. Attackers could leverage the vulnerability to conduct phishing campaigns or spread malware by injecting malicious scripts. This is particularly concerning for sectors such as e-commerce, digital marketing agencies, and any organization engaging customers through online giveaways or contests. The confidentiality and integrity of user data are at risk, potentially leading to GDPR compliance issues and financial penalties. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the threat level. While availability is not directly impacted, the indirect effects of trust erosion and potential blacklisting by browsers or search engines could affect business continuity and customer engagement.

Mitigation Recommendations

Immediate mitigation should focus on updating the 'Giveaways and Contests by RafflePress' plugin to a patched version once it becomes available. Until then, organizations should implement strict input validation and output encoding for all user-supplied data related to social media usernames within the plugin's scope. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious script injection attempts targeting the affected parameters can reduce risk. Conduct thorough code reviews and consider temporarily disabling the plugin if feasible to eliminate exposure. Additionally, monitor web server logs and user reports for signs of exploitation or anomalous behavior. Educate website administrators on safe plugin management and the importance of timely updates. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. Finally, ensure incident response plans include steps to handle potential XSS exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-29T19:11:25.942Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d774bfcf6450804cbcae4

Added to database: 11/19/2025, 7:52:43 AM

Last enriched: 11/19/2025, 8:08:09 AM

Last updated: 11/19/2025, 10:03:52 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats