CVE-2025-12650: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sgcoskey Simple post listing
The Simple post listing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class_name' parameter in the postlist shortcode in all versions up to, and including, 0.2. This is due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page via mouse interaction.
AI Analysis
Technical Summary
CVE-2025-12650 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Simple post listing plugin for WordPress, developed by sgcoskey. The vulnerability exists in all versions up to and including 0.2 due to insufficient sanitization and escaping of the 'class_name' parameter within the postlist shortcode. This parameter accepts user-supplied input that is embedded into web pages without proper neutralization, allowing an authenticated attacker with contributor-level permissions or higher to inject arbitrary JavaScript code. Because the injected scripts are stored persistently, they execute whenever any user accesses the compromised page and interacts with it via mouse actions. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required (low), no user interaction needed, and a scope change. The impact primarily affects confidentiality and integrity, as malicious scripts can steal session tokens, perform actions on behalf of users, or alter page content. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights a common security weakness in WordPress plugins where insufficient input validation leads to stored XSS, a frequent vector for web application attacks.
Potential Impact
For European organizations, the impact of CVE-2025-12650 can be significant, especially for those relying on WordPress sites with the Simple post listing plugin installed. Exploitation allows attackers with contributor-level access to inject persistent malicious scripts that execute in the browsers of site visitors or administrators. This can lead to session hijacking, unauthorized actions performed with victim credentials, defacement, or distribution of malware. Confidential information such as authentication tokens or personal data could be exposed, violating GDPR requirements and potentially resulting in regulatory penalties. The integrity of website content and user trust may be compromised, damaging brand reputation. Since the attack requires authenticated access, insider threats or compromised contributor accounts are primary vectors. The vulnerability can also be leveraged as a foothold for further attacks within an organization’s web infrastructure. Given the widespread use of WordPress in Europe, especially among SMEs and public sector entities, the risk is non-trivial. The lack of a patch increases exposure time, and organizations with limited security monitoring may remain unaware of exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-12650, organizations should first verify if the Simple post listing plugin (sgcoskey) is installed and identify the version in use. Immediate steps include: 1) Restrict contributor-level permissions strictly to trusted users and audit existing user roles to minimize risk of malicious input. 2) Disable or remove the vulnerable plugin if it is not essential, or replace it with a secure alternative that properly sanitizes inputs. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'class_name' parameter in postlist shortcodes. 4) Employ Content Security Policy (CSP) headers to limit script execution sources and reduce impact of injected scripts. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 6) Educate content contributors on safe input practices and the risks of injecting untrusted content. 7) Follow vendor announcements for patches or updates and apply them promptly once available. 8) Conduct regular security assessments and penetration tests focused on WordPress plugins to identify similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-12650: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sgcoskey Simple post listing
Description
The Simple post listing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class_name' parameter in the postlist shortcode in all versions up to, and including, 0.2. This is due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page via mouse interaction.
AI-Powered Analysis
Technical Analysis
CVE-2025-12650 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Simple post listing plugin for WordPress, developed by sgcoskey. The vulnerability exists in all versions up to and including 0.2 due to insufficient sanitization and escaping of the 'class_name' parameter within the postlist shortcode. This parameter accepts user-supplied input that is embedded into web pages without proper neutralization, allowing an authenticated attacker with contributor-level permissions or higher to inject arbitrary JavaScript code. Because the injected scripts are stored persistently, they execute whenever any user accesses the compromised page and interacts with it via mouse actions. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required (low), no user interaction needed, and a scope change. The impact primarily affects confidentiality and integrity, as malicious scripts can steal session tokens, perform actions on behalf of users, or alter page content. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights a common security weakness in WordPress plugins where insufficient input validation leads to stored XSS, a frequent vector for web application attacks.
Potential Impact
For European organizations, the impact of CVE-2025-12650 can be significant, especially for those relying on WordPress sites with the Simple post listing plugin installed. Exploitation allows attackers with contributor-level access to inject persistent malicious scripts that execute in the browsers of site visitors or administrators. This can lead to session hijacking, unauthorized actions performed with victim credentials, defacement, or distribution of malware. Confidential information such as authentication tokens or personal data could be exposed, violating GDPR requirements and potentially resulting in regulatory penalties. The integrity of website content and user trust may be compromised, damaging brand reputation. Since the attack requires authenticated access, insider threats or compromised contributor accounts are primary vectors. The vulnerability can also be leveraged as a foothold for further attacks within an organization’s web infrastructure. Given the widespread use of WordPress in Europe, especially among SMEs and public sector entities, the risk is non-trivial. The lack of a patch increases exposure time, and organizations with limited security monitoring may remain unaware of exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-12650, organizations should first verify if the Simple post listing plugin (sgcoskey) is installed and identify the version in use. Immediate steps include: 1) Restrict contributor-level permissions strictly to trusted users and audit existing user roles to minimize risk of malicious input. 2) Disable or remove the vulnerable plugin if it is not essential, or replace it with a secure alternative that properly sanitizes inputs. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'class_name' parameter in postlist shortcodes. 4) Employ Content Security Policy (CSP) headers to limit script execution sources and reduce impact of injected scripts. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 6) Educate content contributors on safe input practices and the risks of injecting untrusted content. 7) Follow vendor announcements for patches or updates and apply them promptly once available. 8) Conduct regular security assessments and penetration tests focused on WordPress plugins to identify similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-03T20:11:43.985Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9182650da22753edbad3
Added to database: 12/12/2025, 3:52:34 AM
Last enriched: 12/19/2025, 4:14:06 AM
Last updated: 2/4/2026, 10:33:45 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25585: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25584: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25583: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25582: CWE-122: Heap-based Buffer Overflow in InternationalColorConsortium iccDEV
HighCVE-2026-25541: CWE-680: Integer Overflow to Buffer Overflow in tokio-rs bytes
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.