Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13217: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

0
Medium
VulnerabilityCVE-2025-13217cvecve-2025-13217cwe-79
Published: Wed Dec 17 2025 (12/17/2025, 18:21:34 UTC)
Source: CVE Database V5
Vendor/Project: ultimatemember
Product: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

Description

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the YouTube Video 'value' field in all versions up to, and including, 2.11.0. This is due to insufficient input sanitization and output escaping on user-supplied YouTube video URLs in the `um_profile_field_filter_hook__youtube_video()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that execute whenever a user accesses the injected user's profile page.

AI-Powered Analysis

AILast updated: 12/17/2025, 18:53:54 UTC

Technical Analysis

CVE-2025-13217 is a stored cross-site scripting vulnerability affecting the Ultimate Member plugin for WordPress, which manages user profiles, registration, login, member directories, content restriction, and memberships. The flaw exists in the handling of the YouTube video 'value' field within the `um_profile_field_filter_hook__youtube_video()` function. Specifically, the plugin fails to properly sanitize and escape user-supplied YouTube video URLs before rendering them on profile pages. Authenticated attackers with at least Subscriber-level privileges can exploit this by injecting malicious JavaScript code into their own profile's YouTube video field. When other users or administrators view the infected profile page, the malicious script executes in their browsers. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of the victim. The vulnerability is remotely exploitable over the network without user interaction, with a low attack complexity and privileges required. The CVSS v3.1 score is 6.4, reflecting medium severity with partial impact on confidentiality and integrity but no impact on availability. No patches were linked at the time of publication, and no known exploits have been observed in the wild. The vulnerability highlights the risks of insufficient input validation and output encoding in web applications, especially in widely used WordPress plugins that handle user-generated content.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites using the Ultimate Member plugin, particularly those that allow public or semi-public user profiles with embedded YouTube videos. Exploitation could lead to session hijacking, unauthorized access, and data leakage, undermining user trust and potentially violating GDPR requirements regarding data protection and breach notification. Organizations in sectors such as education, membership-based services, and community platforms that rely on this plugin may face reputational damage and operational disruption. The medium severity rating indicates that while the vulnerability does not directly affect availability, the compromise of confidentiality and integrity can facilitate further attacks or data exfiltration. Given the plugin's popularity in WordPress ecosystems, a large number of European websites could be exposed, increasing the attack surface for threat actors targeting European users and organizations.

Mitigation Recommendations

Immediate mitigation steps include monitoring for plugin updates from Ultimate Member and applying patches as soon as they are released. Until an official patch is available, administrators should consider disabling the YouTube video profile field or restricting its use to trusted users only. Implementing Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the YouTube video field can reduce risk. Additionally, site owners can apply custom input validation and output encoding on the YouTube video URLs to sanitize inputs and prevent script execution. Regular security audits and user privilege reviews should be conducted to minimize the number of users with elevated permissions. Educating users about the risks of injecting untrusted content and monitoring logs for unusual profile updates can also help detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-14T20:12:30.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942f8e7847f7e98df04b541

Added to database: 12/17/2025, 6:39:35 PM

Last enriched: 12/17/2025, 6:53:54 PM

Last updated: 12/18/2025, 3:54:30 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats