CVE-2025-13217: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the YouTube Video 'value' field in all versions up to, and including, 2.11.0. This is due to insufficient input sanitization and output escaping on user-supplied YouTube video URLs in the `um_profile_field_filter_hook__youtube_video()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that execute whenever a user accesses the injected user's profile page.
AI Analysis
Technical Summary
CVE-2025-13217 is a stored cross-site scripting vulnerability affecting the Ultimate Member plugin for WordPress, which manages user profiles, registration, login, member directories, content restriction, and memberships. The flaw exists in the handling of the YouTube video 'value' field within the `um_profile_field_filter_hook__youtube_video()` function. Specifically, the plugin fails to properly sanitize and escape user-supplied YouTube video URLs before rendering them on profile pages. Authenticated attackers with at least Subscriber-level privileges can exploit this by injecting malicious JavaScript code into their own profile's YouTube video field. When other users or administrators view the infected profile page, the malicious script executes in their browsers. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of the victim. The vulnerability is remotely exploitable over the network without user interaction, with a low attack complexity and privileges required. The CVSS v3.1 score is 6.4, reflecting medium severity with partial impact on confidentiality and integrity but no impact on availability. No patches were linked at the time of publication, and no known exploits have been observed in the wild. The vulnerability highlights the risks of insufficient input validation and output encoding in web applications, especially in widely used WordPress plugins that handle user-generated content.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Ultimate Member plugin, particularly those that allow public or semi-public user profiles with embedded YouTube videos. Exploitation could lead to session hijacking, unauthorized access, and data leakage, undermining user trust and potentially violating GDPR requirements regarding data protection and breach notification. Organizations in sectors such as education, membership-based services, and community platforms that rely on this plugin may face reputational damage and operational disruption. The medium severity rating indicates that while the vulnerability does not directly affect availability, the compromise of confidentiality and integrity can facilitate further attacks or data exfiltration. Given the plugin's popularity in WordPress ecosystems, a large number of European websites could be exposed, increasing the attack surface for threat actors targeting European users and organizations.
Mitigation Recommendations
Immediate mitigation steps include monitoring for plugin updates from Ultimate Member and applying patches as soon as they are released. Until an official patch is available, administrators should consider disabling the YouTube video profile field or restricting its use to trusted users only. Implementing Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the YouTube video field can reduce risk. Additionally, site owners can apply custom input validation and output encoding on the YouTube video URLs to sanitize inputs and prevent script execution. Regular security audits and user privilege reviews should be conducted to minimize the number of users with elevated permissions. Educating users about the risks of injecting untrusted content and monitoring logs for unusual profile updates can also help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13217: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
Description
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the YouTube Video 'value' field in all versions up to, and including, 2.11.0. This is due to insufficient input sanitization and output escaping on user-supplied YouTube video URLs in the `um_profile_field_filter_hook__youtube_video()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that execute whenever a user accesses the injected user's profile page.
AI-Powered Analysis
Technical Analysis
CVE-2025-13217 is a stored cross-site scripting vulnerability affecting the Ultimate Member plugin for WordPress, which manages user profiles, registration, login, member directories, content restriction, and memberships. The flaw exists in the handling of the YouTube video 'value' field within the `um_profile_field_filter_hook__youtube_video()` function. Specifically, the plugin fails to properly sanitize and escape user-supplied YouTube video URLs before rendering them on profile pages. Authenticated attackers with at least Subscriber-level privileges can exploit this by injecting malicious JavaScript code into their own profile's YouTube video field. When other users or administrators view the infected profile page, the malicious script executes in their browsers. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of the victim. The vulnerability is remotely exploitable over the network without user interaction, with a low attack complexity and privileges required. The CVSS v3.1 score is 6.4, reflecting medium severity with partial impact on confidentiality and integrity but no impact on availability. No patches were linked at the time of publication, and no known exploits have been observed in the wild. The vulnerability highlights the risks of insufficient input validation and output encoding in web applications, especially in widely used WordPress plugins that handle user-generated content.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Ultimate Member plugin, particularly those that allow public or semi-public user profiles with embedded YouTube videos. Exploitation could lead to session hijacking, unauthorized access, and data leakage, undermining user trust and potentially violating GDPR requirements regarding data protection and breach notification. Organizations in sectors such as education, membership-based services, and community platforms that rely on this plugin may face reputational damage and operational disruption. The medium severity rating indicates that while the vulnerability does not directly affect availability, the compromise of confidentiality and integrity can facilitate further attacks or data exfiltration. Given the plugin's popularity in WordPress ecosystems, a large number of European websites could be exposed, increasing the attack surface for threat actors targeting European users and organizations.
Mitigation Recommendations
Immediate mitigation steps include monitoring for plugin updates from Ultimate Member and applying patches as soon as they are released. Until an official patch is available, administrators should consider disabling the YouTube video profile field or restricting its use to trusted users only. Implementing Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the YouTube video field can reduce risk. Additionally, site owners can apply custom input validation and output encoding on the YouTube video URLs to sanitize inputs and prevent script execution. Regular security audits and user privilege reviews should be conducted to minimize the number of users with elevated permissions. Educating users about the risks of injecting untrusted content and monitoring logs for unusual profile updates can also help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-14T20:12:30.355Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6942f8e7847f7e98df04b541
Added to database: 12/17/2025, 6:39:35 PM
Last enriched: 12/17/2025, 6:53:54 PM
Last updated: 12/18/2025, 3:54:30 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.