CVE-2025-13220: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode attributes in all versions up to, and including, 2.11.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-13220 is a stored cross-site scripting vulnerability identified in the Ultimate Member plugin for WordPress, which provides user profile, registration, login, member directory, content restriction, and membership management features. The vulnerability affects all versions up to and including 2.11.0. It stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of shortcode attributes. Authenticated attackers with Contributor-level privileges or higher can inject arbitrary JavaScript code into pages via these shortcode attributes. When other users access the compromised pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deface content. The vulnerability does not require user interaction beyond page access and can be exploited remotely over the network. The CVSS 3.1 base score is 6.4, indicating medium severity due to the requirement for some privileges but low attack complexity and no user interaction. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk in multi-user WordPress environments. The plugin's widespread use in membership and community sites increases the potential attack surface. The vulnerability highlights the importance of robust input validation and output encoding in WordPress plugin development.
Potential Impact
The impact of CVE-2025-13220 is primarily on the confidentiality and integrity of affected WordPress sites using the Ultimate Member plugin. Attackers with Contributor-level access can inject malicious scripts that execute in the context of other users' browsers, potentially leading to session hijacking, unauthorized actions, privilege escalation, or defacement. This can compromise user accounts, leak sensitive information, and damage organizational reputation. Since the vulnerability does not affect availability directly, denial-of-service is less likely. However, the ability to execute arbitrary scripts can facilitate further attacks such as phishing or malware distribution. Organizations with multi-user WordPress sites, especially those relying on Ultimate Member for membership management, face increased risk. The requirement for authenticated access limits exposure but does not eliminate it, as Contributor roles are common in collaborative environments. The lack of known exploits reduces immediate risk but should not delay remediation. Overall, the vulnerability can lead to significant security breaches if exploited, affecting user trust and compliance with data protection regulations.
Mitigation Recommendations
To mitigate CVE-2025-13220, organizations should first update the Ultimate Member plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators can implement the following measures: restrict Contributor-level permissions to trusted users only, minimizing the risk of malicious shortcode injection; employ web application firewalls (WAFs) with rules to detect and block suspicious shortcode attribute patterns; sanitize and validate all user-generated content before it is saved or rendered, possibly via custom filters or hooks in WordPress; monitor site content for unexpected script injections or anomalies; educate users about the risks of elevated privileges and enforce the principle of least privilege; disable shortcode usage in user-submitted content if feasible; and maintain regular backups to enable recovery from potential defacements or compromises. Additionally, security teams should monitor threat intelligence sources for emerging exploits and be prepared to respond promptly. Implementing Content Security Policy (CSP) headers can also help mitigate the impact of injected scripts by restricting script execution sources.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2025-13220: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
Description
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode attributes in all versions up to, and including, 2.11.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13220 is a stored cross-site scripting vulnerability identified in the Ultimate Member plugin for WordPress, which provides user profile, registration, login, member directory, content restriction, and membership management features. The vulnerability affects all versions up to and including 2.11.0. It stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of shortcode attributes. Authenticated attackers with Contributor-level privileges or higher can inject arbitrary JavaScript code into pages via these shortcode attributes. When other users access the compromised pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deface content. The vulnerability does not require user interaction beyond page access and can be exploited remotely over the network. The CVSS 3.1 base score is 6.4, indicating medium severity due to the requirement for some privileges but low attack complexity and no user interaction. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk in multi-user WordPress environments. The plugin's widespread use in membership and community sites increases the potential attack surface. The vulnerability highlights the importance of robust input validation and output encoding in WordPress plugin development.
Potential Impact
The impact of CVE-2025-13220 is primarily on the confidentiality and integrity of affected WordPress sites using the Ultimate Member plugin. Attackers with Contributor-level access can inject malicious scripts that execute in the context of other users' browsers, potentially leading to session hijacking, unauthorized actions, privilege escalation, or defacement. This can compromise user accounts, leak sensitive information, and damage organizational reputation. Since the vulnerability does not affect availability directly, denial-of-service is less likely. However, the ability to execute arbitrary scripts can facilitate further attacks such as phishing or malware distribution. Organizations with multi-user WordPress sites, especially those relying on Ultimate Member for membership management, face increased risk. The requirement for authenticated access limits exposure but does not eliminate it, as Contributor roles are common in collaborative environments. The lack of known exploits reduces immediate risk but should not delay remediation. Overall, the vulnerability can lead to significant security breaches if exploited, affecting user trust and compliance with data protection regulations.
Mitigation Recommendations
To mitigate CVE-2025-13220, organizations should first update the Ultimate Member plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators can implement the following measures: restrict Contributor-level permissions to trusted users only, minimizing the risk of malicious shortcode injection; employ web application firewalls (WAFs) with rules to detect and block suspicious shortcode attribute patterns; sanitize and validate all user-generated content before it is saved or rendered, possibly via custom filters or hooks in WordPress; monitor site content for unexpected script injections or anomalies; educate users about the risks of elevated privileges and enforce the principle of least privilege; disable shortcode usage in user-submitted content if feasible; and maintain regular backups to enable recovery from potential defacements or compromises. Additionally, security teams should monitor threat intelligence sources for emerging exploits and be prepared to respond promptly. Implementing Content Security Policy (CSP) headers can also help mitigate the impact of injected scripts by restricting script execution sources.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-14T20:41:25.932Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694770dcdaa649f7237704c3
Added to database: 12/21/2025, 4:00:28 AM
Last enriched: 2/27/2026, 9:38:23 AM
Last updated: 3/26/2026, 11:14:19 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.