CVE-2025-12520: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jgwhite33 WP Airbnb Review Slider
The WP Airbnb Review Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.2 due to insufficient URL validation that allows users to pull in a malicious HTML file. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-12520 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 found in the WP Airbnb Review Slider plugin for WordPress, affecting all versions up to and including 4.2. The vulnerability arises due to insufficient validation of URLs in the plugin's admin settings, which allows authenticated users with administrator-level permissions or higher to inject arbitrary HTML or JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the compromised page. The vulnerability specifically impacts multi-site WordPress installations or single-site installations where the unfiltered_html capability has been disabled, limiting the scope but increasing risk in those environments. The attack vector requires administrator privileges, making exploitation more difficult but still feasible in compromised or insider threat scenarios. The CVSS 3.1 base score is 4.0, reflecting a medium severity due to the need for high privileges and user interaction, but with potential for confidentiality and integrity impact through session hijacking or data theft. No public exploits have been reported yet, but the vulnerability's presence in a popular plugin used for embedding Airbnb reviews means it could be targeted in the future. The lack of a patch link suggests that mitigation may currently rely on configuration changes or disabling the plugin until an update is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments using WordPress multi-site configurations with the WP Airbnb Review Slider plugin installed. Successful exploitation could lead to unauthorized script execution in the context of users visiting affected pages, potentially resulting in session hijacking, credential theft, or unauthorized actions performed on behalf of users. Given that exploitation requires administrator privileges, the threat is more relevant in cases of insider threats or where administrator accounts have been compromised. The impact on confidentiality and integrity is notable, especially for organizations handling sensitive customer data or financial transactions through their WordPress sites. Availability impact is minimal as the vulnerability does not cause denial of service. Organizations relying on WordPress for marketing, customer engagement, or e-commerce could face reputational damage if attackers leverage this vulnerability to inject malicious content. The multi-site limitation narrows the affected population but does not eliminate risk for large enterprises or agencies managing multiple client sites.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the WP Airbnb Review Slider plugin, particularly focusing on multi-site setups and configurations where unfiltered_html is disabled. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, restrict administrator access strictly and monitor for unusual admin activity or unexpected changes in plugin settings. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. Regularly review and sanitize all inputs in admin settings, and consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block attempts to inject malicious scripts. Educate administrators on the risks of this vulnerability and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of compromised admin accounts. Finally, maintain vigilance for updates from the plugin vendor or WordPress security teams and apply patches promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12520: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jgwhite33 WP Airbnb Review Slider
Description
The WP Airbnb Review Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.2 due to insufficient URL validation that allows users to pull in a malicious HTML file. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-12520 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 found in the WP Airbnb Review Slider plugin for WordPress, affecting all versions up to and including 4.2. The vulnerability arises due to insufficient validation of URLs in the plugin's admin settings, which allows authenticated users with administrator-level permissions or higher to inject arbitrary HTML or JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the compromised page. The vulnerability specifically impacts multi-site WordPress installations or single-site installations where the unfiltered_html capability has been disabled, limiting the scope but increasing risk in those environments. The attack vector requires administrator privileges, making exploitation more difficult but still feasible in compromised or insider threat scenarios. The CVSS 3.1 base score is 4.0, reflecting a medium severity due to the need for high privileges and user interaction, but with potential for confidentiality and integrity impact through session hijacking or data theft. No public exploits have been reported yet, but the vulnerability's presence in a popular plugin used for embedding Airbnb reviews means it could be targeted in the future. The lack of a patch link suggests that mitigation may currently rely on configuration changes or disabling the plugin until an update is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments using WordPress multi-site configurations with the WP Airbnb Review Slider plugin installed. Successful exploitation could lead to unauthorized script execution in the context of users visiting affected pages, potentially resulting in session hijacking, credential theft, or unauthorized actions performed on behalf of users. Given that exploitation requires administrator privileges, the threat is more relevant in cases of insider threats or where administrator accounts have been compromised. The impact on confidentiality and integrity is notable, especially for organizations handling sensitive customer data or financial transactions through their WordPress sites. Availability impact is minimal as the vulnerability does not cause denial of service. Organizations relying on WordPress for marketing, customer engagement, or e-commerce could face reputational damage if attackers leverage this vulnerability to inject malicious content. The multi-site limitation narrows the affected population but does not eliminate risk for large enterprises or agencies managing multiple client sites.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the WP Airbnb Review Slider plugin, particularly focusing on multi-site setups and configurations where unfiltered_html is disabled. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, restrict administrator access strictly and monitor for unusual admin activity or unexpected changes in plugin settings. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. Regularly review and sanitize all inputs in admin settings, and consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block attempts to inject malicious scripts. Educate administrators on the risks of this vulnerability and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of compromised admin accounts. Finally, maintain vigilance for updates from the plugin vendor or WordPress security teams and apply patches promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-30T16:30:34.365Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d86fc82f4da9bb2f8a04d
Added to database: 11/7/2025, 5:43:24 AM
Last enriched: 11/14/2025, 9:16:40 AM
Last updated: 12/24/2025, 12:45:59 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumCVE-2025-68664: CWE-502: Deserialization of Untrusted Data in langchain-ai langchain
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.