CVE-2025-12935: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in techjewel FluentCRM – Email Newsletter, Automation, Email Marketing, Email Campaigns, Optins, Leads, and CRM Solution
The FluentCRM – Email Newsletter, Automation, Email Marketing, Email Campaigns, Optins, Leads, and CRM Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fluentcrm_content' shortcode in all versions up to, and including, 2.9.84 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-12935 is a stored cross-site scripting vulnerability identified in the FluentCRM plugin for WordPress, a widely used solution for email marketing, automation, and CRM functionalities. The vulnerability exists due to insufficient sanitization and escaping of user-supplied input within the 'fluentcrm_content' shortcode. Authenticated users with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages rendered by the plugin. Because the malicious script is stored, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing sensitive data, or enabling further attacks such as privilege escalation or malware distribution. The vulnerability does not require user interaction beyond visiting the affected page, and the attack surface includes any user who views the compromised content. The CVSS 3.1 base score of 6.4 reflects the network attack vector, low attack complexity, and the requirement for privileges but no user interaction. Although no public exploits are currently known, the vulnerability's presence in a popular WordPress plugin used for marketing and CRM purposes makes it a significant risk, especially for organizations relying on these functions for customer engagement and data management. The lack of a patch at the time of reporting necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized script execution within their WordPress environments, resulting in compromised user sessions, theft of sensitive customer or internal data, and potential defacement or manipulation of marketing content. Given the plugin’s role in managing email campaigns and customer relationship data, attackers could leverage this to conduct phishing attacks, spread malware, or gain deeper access to internal systems. The impact extends to reputational damage, regulatory non-compliance risks under GDPR due to data breaches, and operational disruptions. Organizations with contributor-level users or higher who have access to the WordPress backend are particularly at risk. The vulnerability’s ability to affect any user viewing the injected content broadens the scope of potential victims, including employees, partners, and customers. The medium severity rating indicates a significant but not critical risk, emphasizing the need for timely remediation to prevent escalation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the FluentCRM plugin and verify the version in use. Until an official patch is released, restrict contributor-level and higher access to trusted personnel only, minimizing the risk of malicious input injection. Implement Web Application Firewall (WAF) rules to detect and block suspicious script payloads targeting the 'fluentcrm_content' shortcode. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Regularly monitor logs for unusual activity related to the plugin and conduct security awareness training for users with backend access. Additionally, consider disabling or removing the plugin if it is not essential to operations. Once a patch becomes available, prioritize its deployment across all affected systems. Finally, conduct thorough testing of the WordPress environment post-mitigation to ensure no residual malicious scripts remain.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12935: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in techjewel FluentCRM – Email Newsletter, Automation, Email Marketing, Email Campaigns, Optins, Leads, and CRM Solution
Description
The FluentCRM – Email Newsletter, Automation, Email Marketing, Email Campaigns, Optins, Leads, and CRM Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fluentcrm_content' shortcode in all versions up to, and including, 2.9.84 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-12935 is a stored cross-site scripting vulnerability identified in the FluentCRM plugin for WordPress, a widely used solution for email marketing, automation, and CRM functionalities. The vulnerability exists due to insufficient sanitization and escaping of user-supplied input within the 'fluentcrm_content' shortcode. Authenticated users with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages rendered by the plugin. Because the malicious script is stored, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing sensitive data, or enabling further attacks such as privilege escalation or malware distribution. The vulnerability does not require user interaction beyond visiting the affected page, and the attack surface includes any user who views the compromised content. The CVSS 3.1 base score of 6.4 reflects the network attack vector, low attack complexity, and the requirement for privileges but no user interaction. Although no public exploits are currently known, the vulnerability's presence in a popular WordPress plugin used for marketing and CRM purposes makes it a significant risk, especially for organizations relying on these functions for customer engagement and data management. The lack of a patch at the time of reporting necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized script execution within their WordPress environments, resulting in compromised user sessions, theft of sensitive customer or internal data, and potential defacement or manipulation of marketing content. Given the plugin’s role in managing email campaigns and customer relationship data, attackers could leverage this to conduct phishing attacks, spread malware, or gain deeper access to internal systems. The impact extends to reputational damage, regulatory non-compliance risks under GDPR due to data breaches, and operational disruptions. Organizations with contributor-level users or higher who have access to the WordPress backend are particularly at risk. The vulnerability’s ability to affect any user viewing the injected content broadens the scope of potential victims, including employees, partners, and customers. The medium severity rating indicates a significant but not critical risk, emphasizing the need for timely remediation to prevent escalation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the FluentCRM plugin and verify the version in use. Until an official patch is released, restrict contributor-level and higher access to trusted personnel only, minimizing the risk of malicious input injection. Implement Web Application Firewall (WAF) rules to detect and block suspicious script payloads targeting the 'fluentcrm_content' shortcode. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Regularly monitor logs for unusual activity related to the plugin and conduct security awareness training for users with backend access. Additionally, consider disabling or removing the plugin if it is not essential to operations. Once a patch becomes available, prioritize its deployment across all affected systems. Finally, conduct thorough testing of the WordPress environment post-mitigation to ensure no residual malicious scripts remain.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-09T22:17:40.122Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69205c2dc36be036e6ff26c5
Added to database: 11/21/2025, 12:33:49 PM
Last enriched: 11/21/2025, 1:10:38 PM
Last updated: 11/21/2025, 3:03:47 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41115: Vulnerability in Grafana Grafana Enterprise
CriticalCVE-2025-13432: CWE-863: Incorrect Authorization in HashiCorp Terraform Enterprise
MediumCVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
CriticalSliver C2 vulnerability enables attack on C2 operators through insecure Wireguard network
MediumCVE-2025-66115: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in MatrixAddons Easy Invoice
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.