Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12965: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nalam-1 Magical Posts Display – Elementor Advanced Posts widgets

0
Medium
VulnerabilityCVE-2025-12965cvecve-2025-12965cwe-79
Published: Fri Dec 12 2025 (12/12/2025, 11:15:50 UTC)
Source: CVE Database V5
Vendor/Project: nalam-1
Product: Magical Posts Display – Elementor Advanced Posts widgets

Description

The Magical Posts Display plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'mpac_title_tag' parameter in the Magical Posts Accordion widget in all versions up to, and including, 1.2.54 due to insufficient input sanitization and output escaping on user-supplied HTML tag names. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 12/12/2025, 11:45:34 UTC

Technical Analysis

CVE-2025-12965 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Magical Posts Display plugin for WordPress, specifically within the Elementor Advanced Posts widgets component. This vulnerability affects all versions up to and including 1.2.54. The root cause is insufficient input sanitization and output escaping of the 'mpac_title_tag' parameter, which is used to specify HTML tag names in the Magical Posts Accordion widget. Because the plugin fails to properly neutralize user-supplied HTML tag names, an authenticated attacker with Author-level access or higher can inject arbitrary JavaScript code into pages. These malicious scripts are stored persistently and executed in the browsers of any users who visit the affected pages, enabling attacks such as session hijacking, privilege escalation, or defacement. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges of an authenticated user with author rights, but no user interaction is needed for exploitation. The scope is changed because the vulnerability affects other users beyond the attacker. There are no known exploits in the wild at the time of publication. The vulnerability was reserved on November 10, 2025, and published on December 12, 2025. No official patches have been linked yet, so mitigation relies on best practices until an update is available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress sites using the Magical Posts Display plugin, especially those leveraging Elementor Advanced Posts widgets. Since exploitation requires only Author-level access, any compromised or malicious insider or contributor could inject persistent malicious scripts. This can lead to unauthorized access to user sessions, data theft, defacement of websites, or distribution of malware to site visitors. The impact on confidentiality and integrity is moderate, as attackers can steal sensitive information or manipulate content. Availability is not directly affected. Organizations with multi-author blogs, news portals, or corporate websites using this plugin are particularly vulnerable. The risk is amplified in sectors with strict data protection regulations such as GDPR, where data breaches can lead to heavy fines and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks against European political, financial, or media organizations that rely on WordPress for content management.

Mitigation Recommendations

1. Monitor the plugin vendor's official channels for an official security patch and apply it immediately upon release. 2. Until a patch is available, restrict Author-level permissions to trusted users only, minimizing the risk of malicious script injection. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious inputs targeting the 'mpac_title_tag' parameter. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 5. Conduct regular security audits and code reviews of customizations involving the Magical Posts Display plugin. 6. Use security plugins that can detect and sanitize stored XSS payloads in WordPress content. 7. Educate content authors and administrators about the risks of XSS and safe content practices. 8. Consider temporarily disabling the Magical Posts Accordion widget if feasible until the vulnerability is remediated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T17:24:03.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bfc942d1261d38d80bd9b

Added to database: 12/12/2025, 11:29:24 AM

Last enriched: 12/12/2025, 11:45:34 AM

Last updated: 12/15/2025, 4:03:47 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats