Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in widgetpack Reviews Widget for Google, Yelp & Recommendations

0
High
VulnerabilityCVE-2025-12705cvecve-2025-12705cwe-79
Published: Tue Dec 09 2025 (12/09/2025, 13:51:06 UTC)
Source: CVE Database V5
Vendor/Project: widgetpack
Product: Reviews Widget for Google, Yelp & Recommendations

Description

CVE-2025-12705 is a high-severity stored cross-site scripting (XSS) vulnerability in the Social Reviews & Recommendations WordPress plugin by widgetpack, affecting all versions up to 2. 5. The flaw arises from improper input sanitization and output escaping in the 'trim_text' function, allowing unauthenticated attackers to inject malicious scripts that execute when users view the compromised pages. This vulnerability can lead to partial compromise of confidentiality and integrity without requiring user interaction or authentication. Although a partial patch was introduced in version 2. 5, the vulnerability remains in all affected versions. Exploitation can result in session hijacking, defacement, or redirection to malicious sites. European organizations using this plugin on WordPress sites are at risk, especially those with customer-facing review widgets. Mitigation involves promptly updating to a fully patched version once available, implementing web application firewalls with XSS protections, and auditing user-generated content handling. Countries with high WordPress adoption and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be impacted.

AI-Powered Analysis

AILast updated: 12/16/2025, 14:32:08 UTC

Technical Analysis

CVE-2025-12705 is a stored cross-site scripting vulnerability identified in the Social Reviews & Recommendations plugin for WordPress, developed by widgetpack. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the 'trim_text' function, which fails to adequately sanitize and escape user-supplied input. This flaw allows unauthenticated attackers to inject arbitrary JavaScript payloads into pages displaying reviews or recommendations, which are then executed in the browsers of any users visiting those pages. The vulnerability affects all versions up to and including 2.5, with only a partial patch applied in version 2.5, leaving residual risk. The CVSS 3.1 base score is 7.2, indicating a high severity due to the vulnerability's remote exploitability without authentication or user interaction, and its impact on confidentiality and integrity. The scope is classified as changed (S:C) because the vulnerability affects data beyond the attacker’s privileges, potentially impacting other users. Although no known exploits are currently in the wild, the widespread use of WordPress and this plugin in e-commerce and review-heavy websites increases the risk of exploitation. Attackers could leverage this vulnerability to steal session cookies, perform phishing attacks, or manipulate displayed content, undermining user trust and potentially leading to further compromise. The lack of a complete patch necessitates immediate attention from site administrators to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites that utilize the Social Reviews & Recommendations plugin, particularly those relying on customer reviews and recommendations to drive business. Exploitation could lead to unauthorized script execution in users' browsers, resulting in session hijacking, theft of sensitive information, defacement, or redirection to malicious sites. This undermines user trust and can damage brand reputation, especially for e-commerce and service platforms where customer reviews influence purchasing decisions. The confidentiality and integrity of user data are at risk, although availability is not directly impacted. Given the plugin’s integration with popular platforms like Google and Yelp reviews, the attack surface is broad. European organizations must consider compliance implications under GDPR, as exploitation could lead to personal data breaches and regulatory penalties. The vulnerability’s ease of exploitation without authentication increases the urgency for mitigation, particularly in sectors with high online engagement such as retail, hospitality, and financial services.

Mitigation Recommendations

1. Immediately update the Social Reviews & Recommendations plugin to the latest version once a complete patch is released that fully addresses CVE-2025-12705. 2. Until a full patch is available, implement a Web Application Firewall (WAF) with robust XSS filtering rules to detect and block malicious payloads targeting the 'trim_text' function parameters. 3. Conduct a thorough audit of all user-generated content inputs and outputs related to the plugin, applying manual or automated sanitization and escaping where possible. 4. Restrict permissions on who can submit reviews or recommendations to reduce the risk of malicious input injection. 5. Monitor website logs and user reports for unusual activity or signs of XSS exploitation, such as unexpected redirects or script execution. 6. Educate website administrators and developers about secure coding practices, emphasizing proper input validation and output encoding. 7. Consider temporarily disabling the vulnerable widget if immediate patching is not feasible, especially on high-traffic or sensitive sites. 8. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 9. Regularly back up website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T19:08:58.053Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69382bbdabbdc4595cd8b6cc

Added to database: 12/9/2025, 2:01:33 PM

Last enriched: 12/16/2025, 2:32:08 PM

Last updated: 2/5/2026, 9:47:25 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats