CVE-2025-12645: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in karthiksg Inline frame – Iframe
CVE-2025-12645 is a stored Cross-Site Scripting (XSS) vulnerability in the Inline frame – Iframe WordPress plugin by karthiksg, affecting all versions up to 0. 1. It arises from improper input sanitization and output escaping of the 'embedsite' shortcode attributes, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability has a CVSS 3. 1 score of 6. 4 (medium severity), requiring no user interaction but limited to authenticated contributors. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites face risks to confidentiality and integrity, especially in sectors relying on contributor-generated content. Mitigation involves restricting contributor privileges, applying strict input validation, and monitoring for suspicious shortcode usage.
AI Analysis
Technical Summary
CVE-2025-12645 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Inline frame – Iframe plugin for WordPress, developed by karthiksg. This vulnerability exists in all versions up to and including 0.1 due to insufficient sanitization and escaping of user-supplied input in the 'embedsite' shortcode attributes. Specifically, authenticated users with contributor-level access or higher can inject arbitrary JavaScript code into pages via this shortcode. Because the malicious script is stored, it executes whenever any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where multiple contributors publish content. The plugin’s widespread use in WordPress sites makes this a relevant threat for web administrators. The lack of available patches at the time of publication requires organizations to implement compensating controls until updates are released.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution on websites that use the Inline frame – Iframe plugin, potentially resulting in session hijacking, theft of sensitive user data, defacement, or unauthorized actions performed under the context of legitimate users. This can damage organizational reputation, lead to data breaches involving personal or business-critical information, and violate data protection regulations such as GDPR. Organizations relying on contributor-generated content are particularly at risk because contributors can inject malicious code. The impact is more severe for public-facing websites with high user interaction or e-commerce platforms. Additionally, compromised sites may be used as vectors for further attacks or phishing campaigns targeting European users. The medium severity score indicates a significant but not critical risk, emphasizing the need for timely mitigation to prevent exploitation.
Mitigation Recommendations
1. Restrict contributor-level access strictly to trusted users and review contributor permissions regularly to minimize the risk of malicious input. 2. Implement strict input validation and output encoding for all shortcode attributes, especially the 'embedsite' parameter, to prevent injection of executable scripts. 3. Employ Web Application Firewalls (WAFs) with rules targeting XSS payloads related to the Inline frame – Iframe plugin. 4. Monitor website content and logs for unusual shortcode usage or unexpected script injections. 5. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 6. Until an official patch is released, consider disabling or removing the vulnerable plugin from production environments. 7. Educate content contributors about secure content practices and the risks of injecting untrusted code. 8. Regularly update WordPress core and plugins to the latest versions once patches become available. 9. Conduct security audits focusing on user-generated content and shortcode usage to detect potential exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12645: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in karthiksg Inline frame – Iframe
Description
CVE-2025-12645 is a stored Cross-Site Scripting (XSS) vulnerability in the Inline frame – Iframe WordPress plugin by karthiksg, affecting all versions up to 0. 1. It arises from improper input sanitization and output escaping of the 'embedsite' shortcode attributes, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability has a CVSS 3. 1 score of 6. 4 (medium severity), requiring no user interaction but limited to authenticated contributors. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites face risks to confidentiality and integrity, especially in sectors relying on contributor-generated content. Mitigation involves restricting contributor privileges, applying strict input validation, and monitoring for suspicious shortcode usage.
AI-Powered Analysis
Technical Analysis
CVE-2025-12645 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Inline frame – Iframe plugin for WordPress, developed by karthiksg. This vulnerability exists in all versions up to and including 0.1 due to insufficient sanitization and escaping of user-supplied input in the 'embedsite' shortcode attributes. Specifically, authenticated users with contributor-level access or higher can inject arbitrary JavaScript code into pages via this shortcode. Because the malicious script is stored, it executes whenever any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where multiple contributors publish content. The plugin’s widespread use in WordPress sites makes this a relevant threat for web administrators. The lack of available patches at the time of publication requires organizations to implement compensating controls until updates are released.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution on websites that use the Inline frame – Iframe plugin, potentially resulting in session hijacking, theft of sensitive user data, defacement, or unauthorized actions performed under the context of legitimate users. This can damage organizational reputation, lead to data breaches involving personal or business-critical information, and violate data protection regulations such as GDPR. Organizations relying on contributor-generated content are particularly at risk because contributors can inject malicious code. The impact is more severe for public-facing websites with high user interaction or e-commerce platforms. Additionally, compromised sites may be used as vectors for further attacks or phishing campaigns targeting European users. The medium severity score indicates a significant but not critical risk, emphasizing the need for timely mitigation to prevent exploitation.
Mitigation Recommendations
1. Restrict contributor-level access strictly to trusted users and review contributor permissions regularly to minimize the risk of malicious input. 2. Implement strict input validation and output encoding for all shortcode attributes, especially the 'embedsite' parameter, to prevent injection of executable scripts. 3. Employ Web Application Firewalls (WAFs) with rules targeting XSS payloads related to the Inline frame – Iframe plugin. 4. Monitor website content and logs for unusual shortcode usage or unexpected script injections. 5. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 6. Until an official patch is released, consider disabling or removing the vulnerable plugin from production environments. 7. Educate content contributors about secure content practices and the risks of injecting untrusted code. 8. Regularly update WordPress core and plugins to the latest versions once patches become available. 9. Conduct security audits focusing on user-generated content and shortcode usage to detect potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-03T19:46:06.811Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69255e27292ce6fc00be05e2
Added to database: 11/25/2025, 7:43:35 AM
Last enriched: 12/2/2025, 2:46:25 PM
Last updated: 12/4/2025, 7:47:12 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-29269: n/a
UnknownCVE-2025-29268: n/a
UnknownCVE-2025-65883: n/a
UnknownCVE-2025-65806: n/a
UnknownCVE-2025-12097: CWE-23- Relative Path Traversal in NI LabVIEW
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.