CVE-2025-12510: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 13.2.4 due to insufficient input sanitization and output escaping on Google Reviews data imported by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute in the admin panel (and potentially on the frontend) whenever a user accesses imported reviews, granted they can add a malicious review to a Google Place that is connected to the vulnerable site.
AI Analysis
Technical Summary
CVE-2025-12510 is a Stored Cross-Site Scripting vulnerability classified under CWE-79, affecting the Widgets for Google Reviews plugin for WordPress in all versions up to and including 13.2.4. The vulnerability stems from insufficient sanitization and escaping of user-supplied data imported from Google Reviews, which the plugin displays within the WordPress admin panel and potentially on the website frontend. An attacker can exploit this by submitting a maliciously crafted review to a Google Place associated with the vulnerable WordPress site. When the plugin imports and renders this review, the embedded script executes in the context of the admin panel or frontend, depending on where the data is displayed. This allows execution of arbitrary JavaScript, which can lead to session hijacking, privilege escalation, or further attacks against site visitors or administrators. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The CVSS v3.1 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change with partial confidentiality and integrity impact but no availability impact. Although no exploits have been observed in the wild yet, the widespread use of WordPress and this plugin increases the risk of future exploitation. The vulnerability highlights the importance of proper input validation and output encoding when handling third-party data in web applications.
Potential Impact
The vulnerability allows unauthenticated remote attackers to inject and execute arbitrary JavaScript code within the WordPress admin panel and potentially on the frontend of affected sites. This can lead to theft of administrator session cookies, unauthorized actions within the admin interface, defacement, or distribution of malware to site visitors. The compromise of admin accounts can result in full site takeover, data breaches, and disruption of business operations. Since the attack vector is through Google Reviews data, organizations relying on this plugin for customer feedback display are at risk without direct user interaction or authentication. The scope includes all sites using the vulnerable plugin versions, which could be substantial given WordPress’s market share and the popularity of Google Reviews widgets. The confidentiality and integrity of site data and user information are at risk, though availability impact is minimal. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.
Mitigation Recommendations
Organizations should immediately update the Widgets for Google Reviews plugin to a patched version once available. Until a patch is released, administrators should consider disabling the plugin or removing it if feasible. Implementing web application firewall (WAF) rules to detect and block suspicious script payloads in incoming Google Reviews data can provide temporary protection. Restricting administrative access to trusted IP addresses and enforcing multi-factor authentication (MFA) reduces the risk of account compromise if exploitation occurs. Regularly monitoring logs for unusual admin panel activity or unexpected script execution can aid early detection. Site owners should also review the Google Places linked to their sites and monitor for suspicious or malicious reviews. Developers maintaining similar plugins should audit their input sanitization and output encoding practices, especially when importing third-party data. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-12510: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
Description
The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 13.2.4 due to insufficient input sanitization and output escaping on Google Reviews data imported by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute in the admin panel (and potentially on the frontend) whenever a user accesses imported reviews, granted they can add a malicious review to a Google Place that is connected to the vulnerable site.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12510 is a Stored Cross-Site Scripting vulnerability classified under CWE-79, affecting the Widgets for Google Reviews plugin for WordPress in all versions up to and including 13.2.4. The vulnerability stems from insufficient sanitization and escaping of user-supplied data imported from Google Reviews, which the plugin displays within the WordPress admin panel and potentially on the website frontend. An attacker can exploit this by submitting a maliciously crafted review to a Google Place associated with the vulnerable WordPress site. When the plugin imports and renders this review, the embedded script executes in the context of the admin panel or frontend, depending on where the data is displayed. This allows execution of arbitrary JavaScript, which can lead to session hijacking, privilege escalation, or further attacks against site visitors or administrators. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The CVSS v3.1 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change with partial confidentiality and integrity impact but no availability impact. Although no exploits have been observed in the wild yet, the widespread use of WordPress and this plugin increases the risk of future exploitation. The vulnerability highlights the importance of proper input validation and output encoding when handling third-party data in web applications.
Potential Impact
The vulnerability allows unauthenticated remote attackers to inject and execute arbitrary JavaScript code within the WordPress admin panel and potentially on the frontend of affected sites. This can lead to theft of administrator session cookies, unauthorized actions within the admin interface, defacement, or distribution of malware to site visitors. The compromise of admin accounts can result in full site takeover, data breaches, and disruption of business operations. Since the attack vector is through Google Reviews data, organizations relying on this plugin for customer feedback display are at risk without direct user interaction or authentication. The scope includes all sites using the vulnerable plugin versions, which could be substantial given WordPress’s market share and the popularity of Google Reviews widgets. The confidentiality and integrity of site data and user information are at risk, though availability impact is minimal. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.
Mitigation Recommendations
Organizations should immediately update the Widgets for Google Reviews plugin to a patched version once available. Until a patch is released, administrators should consider disabling the plugin or removing it if feasible. Implementing web application firewall (WAF) rules to detect and block suspicious script payloads in incoming Google Reviews data can provide temporary protection. Restricting administrative access to trusted IP addresses and enforcing multi-factor authentication (MFA) reduces the risk of account compromise if exploitation occurs. Regularly monitoring logs for unusual admin panel activity or unexpected script execution can aid early detection. Site owners should also review the Google Places linked to their sites and monitor for suspicious or malicious reviews. Developers maintaining similar plugins should audit their input sanitization and output encoding practices, especially when importing third-party data. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-30T14:13:05.206Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933a6d1f88dbe026c8d8258
Added to database: 12/6/2025, 3:45:21 AM
Last enriched: 2/27/2026, 8:39:44 PM
Last updated: 3/25/2026, 3:09:30 AM
Views: 146
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.