Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13355: CWE-79 Cross-Site Scripting (XSS) in URL Shortify

0
High
VulnerabilityCVE-2025-13355cvecve-2025-13355cwe-79
Published: Mon Dec 15 2025 (12/15/2025, 06:00:08 UTC)
Source: CVE Database V5
Product: URL Shortify

Description

The URL Shortify WordPress plugin before 1.11.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

AI-Powered Analysis

AILast updated: 12/15/2025, 06:30:33 UTC

Technical Analysis

CVE-2025-13355 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the URL Shortify WordPress plugin prior to version 1.11.4. The vulnerability stems from the plugin's failure to properly sanitize and escape a parameter before outputting it back into the webpage, which allows an attacker to inject malicious JavaScript code. This type of XSS is reflected, meaning the malicious payload is part of the URL or request and is immediately reflected in the server's response. The primary risk is to high-privilege users such as WordPress administrators who, if tricked into clicking a crafted URL, could have their session tokens stolen or their accounts compromised. This could lead to unauthorized administrative actions, including site defacement, data theft, or installation of backdoors. The vulnerability does not require authentication to exploit but targets authenticated users with elevated privileges, increasing its severity. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be considered exploitable. The lack of a CVSS score means severity must be inferred from the nature of the vulnerability, the affected user roles, and the ease of exploitation. The plugin is widely used in WordPress environments, which are prevalent across many European organizations, especially in sectors relying on content management systems for public-facing websites.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the confidentiality and integrity of their WordPress-based websites. Attackers exploiting this vulnerability could hijack administrator sessions, leading to unauthorized access to sensitive data, modification or deletion of content, and potential deployment of malware or ransomware. This could disrupt business operations, damage reputation, and result in regulatory non-compliance, especially under GDPR where data breaches must be reported. Organizations in sectors such as government, finance, healthcare, and e-commerce are particularly at risk due to the sensitive nature of their data and the criticality of their web presence. The reflected XSS nature means that exploitation requires social engineering to lure administrators into clicking malicious links, but given the high privileges involved, the impact of a successful attack is severe. The absence of known exploits in the wild provides a window for proactive mitigation, but the public disclosure increases the risk of future exploitation attempts.

Mitigation Recommendations

European organizations should immediately update the URL Shortify plugin to version 1.11.4 or later where the vulnerability is fixed. If immediate patching is not possible, implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the vulnerable parameter. Educate administrators and privileged users about the risks of clicking untrusted links, especially those received via email or messaging platforms. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. Regularly audit and monitor WordPress logs for unusual access patterns or attempts to exploit XSS vulnerabilities. Consider isolating administrative interfaces behind VPNs or IP whitelisting to reduce exposure. Finally, conduct periodic security assessments of WordPress plugins and themes to identify and remediate vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-11-18T13:17:34.568Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693fa76fd9bcdf3f3db9000f

Added to database: 12/15/2025, 6:15:11 AM

Last enriched: 12/15/2025, 6:30:33 AM

Last updated: 12/15/2025, 4:16:10 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats