Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in widgetpack Reviews Widget for Google, Yelp & Recommendations

0
High
VulnerabilityCVE-2025-12705cvecve-2025-12705cwe-79
Published: Tue Dec 09 2025 (12/09/2025, 13:51:06 UTC)
Source: CVE Database V5
Vendor/Project: widgetpack
Product: Reviews Widget for Google, Yelp & Recommendations

Description

The Social Reviews & Recommendations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in the 'trim_text' function in all versions up to, and including, 2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:00:41 UTC

Technical Analysis

CVE-2025-12705 identifies a stored Cross-Site Scripting vulnerability in the Social Reviews & Recommendations plugin for WordPress, specifically within the widgetpack Reviews Widget that integrates Google, Yelp, and other recommendations. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), particularly in the 'trim_text' function, which fails to adequately sanitize and escape user-supplied input before rendering it on web pages. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed in the browsers of any users who visit the compromised pages. The vulnerability affects all plugin versions up to and including 2.5, with only a partial fix applied in version 2.5, leaving residual risk. The CVSS v3.1 score is 7.2 (high), reflecting that the attack vector is network-based with low attack complexity, no privileges or user interaction required, and a scope change affecting confidentiality and integrity. The impact includes potential theft of session cookies, user impersonation, and manipulation of page content, which can facilitate further attacks such as phishing or malware distribution. No public exploits have been reported yet, but the widespread use of WordPress and this popular plugin increases the likelihood of future exploitation attempts. The vulnerability is particularly dangerous because it is stored XSS, meaning injected scripts persist and affect multiple users over time.

Potential Impact

The impact of CVE-2025-12705 is significant for organizations using the vulnerable widgetpack Reviews Widget on their WordPress sites. Successful exploitation can lead to the theft of sensitive user information such as session cookies or credentials, enabling account hijacking and unauthorized actions performed on behalf of legitimate users. This compromises the confidentiality and integrity of user data and site content. Additionally, attackers can use the vulnerability to deliver malicious payloads, conduct phishing attacks, or spread malware, damaging the organization's reputation and potentially causing regulatory compliance issues. Since the vulnerability requires no authentication or user interaction and is exploitable remotely, it poses a broad risk to any affected website visitors. The persistence of injected scripts (stored XSS) means that once compromised, the site remains a vector for attacks until fully remediated. This can result in prolonged exposure and increased damage. E-commerce, financial, and high-traffic websites are especially at risk due to the potential scale of user impact and the value of compromised data.

Mitigation Recommendations

To mitigate CVE-2025-12705 effectively, organizations should: 1) Immediately update the Social Reviews & Recommendations plugin to the latest version once a full patch is released, as version 2.5 only partially addresses the issue. 2) In the interim, disable or remove the vulnerable Reviews Widget if updating is not possible. 3) Implement Web Application Firewall (WAF) rules specifically targeting suspicious input patterns related to the 'trim_text' function parameters to block malicious payloads. 4) Conduct thorough input validation and output encoding on all user-supplied data within the plugin’s codebase, ensuring compliance with secure coding standards for XSS prevention. 5) Regularly audit and sanitize existing content to detect and remove any previously injected malicious scripts. 6) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 7) Monitor web server and application logs for unusual activity indicative of exploitation attempts. 8) Educate site administrators about the risks and signs of XSS attacks to improve incident response readiness. These steps combined provide defense-in-depth until a comprehensive patch is available and deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T19:08:58.053Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69382bbdabbdc4595cd8b6cc

Added to database: 12/9/2025, 2:01:33 PM

Last enriched: 2/27/2026, 9:00:41 PM

Last updated: 3/25/2026, 1:39:43 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses