CVE-2025-12510: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 13.2.4 due to insufficient input sanitization and output escaping on Google Reviews data imported by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute in the admin panel (and potentially on the frontend) whenever a user accesses imported reviews, granted they can add a malicious review to a Google Place that is connected to the vulnerable site.
AI Analysis
Technical Summary
CVE-2025-12510 identifies a stored Cross-Site Scripting vulnerability in the Widgets for Google Reviews plugin for WordPress, affecting all versions up to 13.2.4. The vulnerability stems from the plugin's failure to properly sanitize and escape input data imported from Google Reviews, which is then embedded into web pages without adequate neutralization. This allows an unauthenticated attacker to inject arbitrary JavaScript code by submitting a malicious review to a Google Place associated with the vulnerable WordPress site. When an administrator or user accesses the imported reviews via the admin panel or potentially the frontend, the malicious script executes in their browser context. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized administrative actions. The CVSS 3.1 score of 7.2 reflects that the attack can be performed remotely over the network without authentication or user interaction, and the vulnerability affects the security scope beyond the vulnerable component. Although no known exploits have been reported in the wild, the ease of exploitation and potential impact make this a significant threat. The vulnerability is categorized under CWE-79, which covers improper neutralization of input during web page generation. The plugin is widely used in WordPress sites to display Google Reviews, making many websites potentially vulnerable until patched. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites that utilize the Widgets for Google Reviews plugin to display customer feedback. Exploitation could lead to unauthorized script execution in administrative contexts, potentially allowing attackers to hijack admin sessions, steal sensitive data, or perform unauthorized actions within the WordPress environment. This can compromise the confidentiality and integrity of organizational data and disrupt website operations. Public-facing websites relying on Google Reviews for reputation management are particularly vulnerable, as attackers can leverage the review submission process to inject malicious payloads. The impact extends to customer trust and brand reputation, especially for e-commerce, hospitality, and service sectors prevalent in Europe. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and exploitation of this vulnerability could lead to compliance violations and associated penalties. The vulnerability's network-exploitable nature without authentication increases the attack surface, making it easier for threat actors to target European organizations with minimal barriers.
Mitigation Recommendations
Organizations should prioritize updating the Widgets for Google Reviews plugin to a patched version once it becomes available from the vendor. Until a patch is released, administrators should consider disabling the plugin or removing the Google Reviews widget from their sites to eliminate exposure. Implementing Web Application Firewall (WAF) rules to detect and block suspicious script injection patterns in incoming review data can provide interim protection. Additionally, organizations can enforce strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on their websites. Regularly monitoring Google Places reviews for suspicious or unexpected content can help identify potential attack attempts early. Site administrators should also ensure that WordPress and all plugins are kept up to date and conduct security audits focusing on input validation and output encoding practices. Employing security plugins that sanitize user-generated content and restrict administrative access to trusted personnel further reduces risk. Finally, educating staff about the risks of XSS and safe review management practices can enhance overall security posture.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-12510: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
Description
The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 13.2.4 due to insufficient input sanitization and output escaping on Google Reviews data imported by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute in the admin panel (and potentially on the frontend) whenever a user accesses imported reviews, granted they can add a malicious review to a Google Place that is connected to the vulnerable site.
AI-Powered Analysis
Technical Analysis
CVE-2025-12510 identifies a stored Cross-Site Scripting vulnerability in the Widgets for Google Reviews plugin for WordPress, affecting all versions up to 13.2.4. The vulnerability stems from the plugin's failure to properly sanitize and escape input data imported from Google Reviews, which is then embedded into web pages without adequate neutralization. This allows an unauthenticated attacker to inject arbitrary JavaScript code by submitting a malicious review to a Google Place associated with the vulnerable WordPress site. When an administrator or user accesses the imported reviews via the admin panel or potentially the frontend, the malicious script executes in their browser context. The vulnerability impacts confidentiality and integrity by enabling session hijacking, credential theft, or unauthorized administrative actions. The CVSS 3.1 score of 7.2 reflects that the attack can be performed remotely over the network without authentication or user interaction, and the vulnerability affects the security scope beyond the vulnerable component. Although no known exploits have been reported in the wild, the ease of exploitation and potential impact make this a significant threat. The vulnerability is categorized under CWE-79, which covers improper neutralization of input during web page generation. The plugin is widely used in WordPress sites to display Google Reviews, making many websites potentially vulnerable until patched. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites that utilize the Widgets for Google Reviews plugin to display customer feedback. Exploitation could lead to unauthorized script execution in administrative contexts, potentially allowing attackers to hijack admin sessions, steal sensitive data, or perform unauthorized actions within the WordPress environment. This can compromise the confidentiality and integrity of organizational data and disrupt website operations. Public-facing websites relying on Google Reviews for reputation management are particularly vulnerable, as attackers can leverage the review submission process to inject malicious payloads. The impact extends to customer trust and brand reputation, especially for e-commerce, hospitality, and service sectors prevalent in Europe. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and exploitation of this vulnerability could lead to compliance violations and associated penalties. The vulnerability's network-exploitable nature without authentication increases the attack surface, making it easier for threat actors to target European organizations with minimal barriers.
Mitigation Recommendations
Organizations should prioritize updating the Widgets for Google Reviews plugin to a patched version once it becomes available from the vendor. Until a patch is released, administrators should consider disabling the plugin or removing the Google Reviews widget from their sites to eliminate exposure. Implementing Web Application Firewall (WAF) rules to detect and block suspicious script injection patterns in incoming review data can provide interim protection. Additionally, organizations can enforce strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on their websites. Regularly monitoring Google Places reviews for suspicious or unexpected content can help identify potential attack attempts early. Site administrators should also ensure that WordPress and all plugins are kept up to date and conduct security audits focusing on input validation and output encoding practices. Employing security plugins that sanitize user-generated content and restrict administrative access to trusted personnel further reduces risk. Finally, educating staff about the risks of XSS and safe review management practices can enhance overall security posture.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-30T14:13:05.206Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933a6d1f88dbe026c8d8258
Added to database: 12/6/2025, 3:45:21 AM
Last enriched: 12/13/2025, 4:53:24 AM
Last updated: 1/20/2026, 6:29:03 PM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67263: n/a
HighCVE-2025-33231: CWE-427 Uncontrolled Search Path Element in NVIDIA CUDA Toolkit
MediumCVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit
HighCVE-2025-67261: n/a
HighCVE-2025-55423: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.