CVE-2025-12705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in widgetpack Reviews Widget for Google, Yelp & Recommendations
The Social Reviews & Recommendations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in the 'trim_text' function in all versions up to, and including, 2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.5.
AI Analysis
Technical Summary
CVE-2025-12705 identifies a stored Cross-Site Scripting vulnerability in the Social Reviews & Recommendations plugin for WordPress, specifically within the widgetpack Reviews Widget that integrates Google, Yelp, and other recommendations. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), particularly in the 'trim_text' function, which fails to adequately sanitize and escape user-supplied input before rendering it on web pages. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed in the browsers of any users who visit the compromised pages. The vulnerability affects all plugin versions up to and including 2.5, with only a partial fix applied in version 2.5, leaving residual risk. The CVSS v3.1 score is 7.2 (high), reflecting that the attack vector is network-based with low attack complexity, no privileges or user interaction required, and a scope change affecting confidentiality and integrity. The impact includes potential theft of session cookies, user impersonation, and manipulation of page content, which can facilitate further attacks such as phishing or malware distribution. No public exploits have been reported yet, but the widespread use of WordPress and this popular plugin increases the likelihood of future exploitation attempts. The vulnerability is particularly dangerous because it is stored XSS, meaning injected scripts persist and affect multiple users over time.
Potential Impact
The impact of CVE-2025-12705 is significant for organizations using the vulnerable widgetpack Reviews Widget on their WordPress sites. Successful exploitation can lead to the theft of sensitive user information such as session cookies or credentials, enabling account hijacking and unauthorized actions performed on behalf of legitimate users. This compromises the confidentiality and integrity of user data and site content. Additionally, attackers can use the vulnerability to deliver malicious payloads, conduct phishing attacks, or spread malware, damaging the organization's reputation and potentially causing regulatory compliance issues. Since the vulnerability requires no authentication or user interaction and is exploitable remotely, it poses a broad risk to any affected website visitors. The persistence of injected scripts (stored XSS) means that once compromised, the site remains a vector for attacks until fully remediated. This can result in prolonged exposure and increased damage. E-commerce, financial, and high-traffic websites are especially at risk due to the potential scale of user impact and the value of compromised data.
Mitigation Recommendations
To mitigate CVE-2025-12705 effectively, organizations should: 1) Immediately update the Social Reviews & Recommendations plugin to the latest version once a full patch is released, as version 2.5 only partially addresses the issue. 2) In the interim, disable or remove the vulnerable Reviews Widget if updating is not possible. 3) Implement Web Application Firewall (WAF) rules specifically targeting suspicious input patterns related to the 'trim_text' function parameters to block malicious payloads. 4) Conduct thorough input validation and output encoding on all user-supplied data within the plugin’s codebase, ensuring compliance with secure coding standards for XSS prevention. 5) Regularly audit and sanitize existing content to detect and remove any previously injected malicious scripts. 6) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 7) Monitor web server and application logs for unusual activity indicative of exploitation attempts. 8) Educate site administrators about the risks and signs of XSS attacks to improve incident response readiness. These steps combined provide defense-in-depth until a comprehensive patch is available and deployed.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2025-12705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in widgetpack Reviews Widget for Google, Yelp & Recommendations
Description
The Social Reviews & Recommendations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in the 'trim_text' function in all versions up to, and including, 2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12705 identifies a stored Cross-Site Scripting vulnerability in the Social Reviews & Recommendations plugin for WordPress, specifically within the widgetpack Reviews Widget that integrates Google, Yelp, and other recommendations. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), particularly in the 'trim_text' function, which fails to adequately sanitize and escape user-supplied input before rendering it on web pages. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed in the browsers of any users who visit the compromised pages. The vulnerability affects all plugin versions up to and including 2.5, with only a partial fix applied in version 2.5, leaving residual risk. The CVSS v3.1 score is 7.2 (high), reflecting that the attack vector is network-based with low attack complexity, no privileges or user interaction required, and a scope change affecting confidentiality and integrity. The impact includes potential theft of session cookies, user impersonation, and manipulation of page content, which can facilitate further attacks such as phishing or malware distribution. No public exploits have been reported yet, but the widespread use of WordPress and this popular plugin increases the likelihood of future exploitation attempts. The vulnerability is particularly dangerous because it is stored XSS, meaning injected scripts persist and affect multiple users over time.
Potential Impact
The impact of CVE-2025-12705 is significant for organizations using the vulnerable widgetpack Reviews Widget on their WordPress sites. Successful exploitation can lead to the theft of sensitive user information such as session cookies or credentials, enabling account hijacking and unauthorized actions performed on behalf of legitimate users. This compromises the confidentiality and integrity of user data and site content. Additionally, attackers can use the vulnerability to deliver malicious payloads, conduct phishing attacks, or spread malware, damaging the organization's reputation and potentially causing regulatory compliance issues. Since the vulnerability requires no authentication or user interaction and is exploitable remotely, it poses a broad risk to any affected website visitors. The persistence of injected scripts (stored XSS) means that once compromised, the site remains a vector for attacks until fully remediated. This can result in prolonged exposure and increased damage. E-commerce, financial, and high-traffic websites are especially at risk due to the potential scale of user impact and the value of compromised data.
Mitigation Recommendations
To mitigate CVE-2025-12705 effectively, organizations should: 1) Immediately update the Social Reviews & Recommendations plugin to the latest version once a full patch is released, as version 2.5 only partially addresses the issue. 2) In the interim, disable or remove the vulnerable Reviews Widget if updating is not possible. 3) Implement Web Application Firewall (WAF) rules specifically targeting suspicious input patterns related to the 'trim_text' function parameters to block malicious payloads. 4) Conduct thorough input validation and output encoding on all user-supplied data within the plugin’s codebase, ensuring compliance with secure coding standards for XSS prevention. 5) Regularly audit and sanitize existing content to detect and remove any previously injected malicious scripts. 6) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 7) Monitor web server and application logs for unusual activity indicative of exploitation attempts. 8) Educate site administrators about the risks and signs of XSS attacks to improve incident response readiness. These steps combined provide defense-in-depth until a comprehensive patch is available and deployed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-04T19:08:58.053Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69382bbdabbdc4595cd8b6cc
Added to database: 12/9/2025, 2:01:33 PM
Last enriched: 2/27/2026, 9:00:41 PM
Last updated: 3/25/2026, 1:39:43 AM
Views: 155
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.