CVE-2025-13367: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin
CVE-2025-13367 is a stored Cross-Site Scripting (XSS) vulnerability in the wpeverest User Registration & Membership WordPress plugin versions up to 4. 4. 6. Authenticated users with contributor-level access or higher can exploit insufficient input sanitization in shortcode attributes to inject malicious scripts. These scripts execute when any user views the affected pages, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with limited privileges. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites face risks to confidentiality and integrity, especially those with contributor-level user roles. Mitigation involves promptly updating the plugin once a patch is available, restricting contributor privileges, and implementing additional input validation and output encoding controls.
AI Analysis
Technical Summary
CVE-2025-13367 is a stored Cross-Site Scripting (XSS) vulnerability identified in the wpeverest User Registration & Membership plugin for WordPress, affecting all versions up to and including 4.4.6. The vulnerability arises from improper neutralization of input during web page generation, specifically due to insufficient sanitization and output escaping of multiple shortcode attributes. Authenticated attackers with contributor-level access or higher can inject arbitrary JavaScript code into pages via these shortcode attributes. Because the malicious script is stored, it executes every time any user accesses the compromised page, potentially allowing attackers to hijack user sessions, steal cookies, perform actions on behalf of users, or deface the website. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (contributor or above), no user interaction, and scope change. The impact primarily affects confidentiality and integrity but not availability. No public exploits are known at this time, but the vulnerability is publicly disclosed and should be considered a significant risk for affected WordPress sites. The plugin is widely used for custom registration forms, login forms, user profiles, content restriction, and membership management, making it a critical component in many WordPress deployments. The vulnerability was reserved in November 2025 and published in December 2025 by Wordfence.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of user data and website content. Attackers with contributor-level access can inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, unauthorized actions, or data theft. This can undermine user trust, damage brand reputation, and lead to compliance violations under GDPR if personal data is compromised. Since the vulnerability affects membership and user management functionalities, organizations relying on this plugin for customer or employee portals are particularly at risk. The exploitation does not require user interaction but does require authenticated access, which may limit exposure but still presents a significant threat if contributor accounts are compromised or misused. The lack of availability impact means service disruption is unlikely, but the integrity and confidentiality risks remain substantial. European organizations with public-facing WordPress sites using this plugin should prioritize mitigation to prevent exploitation.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the wpeverest plugin vendor as soon as they are released to address CVE-2025-13367. 2. Until a patch is available, restrict contributor-level user permissions to the minimum necessary and audit existing contributor accounts for suspicious activity. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious shortcode attribute payloads targeting this vulnerability. 4. Employ additional input validation and output encoding on shortcode attributes at the application or server level to reduce injection risk. 5. Conduct regular security audits and penetration testing focused on WordPress plugins and user input handling. 6. Educate site administrators and content contributors about the risks of injecting untrusted content and enforce strict content policies. 7. Consider disabling or replacing the affected plugin with alternatives that follow secure coding practices if immediate patching is not feasible. 8. Monitor logs for unusual script injection attempts or anomalous contributor activity to detect early exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13367: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin
Description
CVE-2025-13367 is a stored Cross-Site Scripting (XSS) vulnerability in the wpeverest User Registration & Membership WordPress plugin versions up to 4. 4. 6. Authenticated users with contributor-level access or higher can exploit insufficient input sanitization in shortcode attributes to inject malicious scripts. These scripts execute when any user views the affected pages, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with limited privileges. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites face risks to confidentiality and integrity, especially those with contributor-level user roles. Mitigation involves promptly updating the plugin once a patch is available, restricting contributor privileges, and implementing additional input validation and output encoding controls.
AI-Powered Analysis
Technical Analysis
CVE-2025-13367 is a stored Cross-Site Scripting (XSS) vulnerability identified in the wpeverest User Registration & Membership plugin for WordPress, affecting all versions up to and including 4.4.6. The vulnerability arises from improper neutralization of input during web page generation, specifically due to insufficient sanitization and output escaping of multiple shortcode attributes. Authenticated attackers with contributor-level access or higher can inject arbitrary JavaScript code into pages via these shortcode attributes. Because the malicious script is stored, it executes every time any user accesses the compromised page, potentially allowing attackers to hijack user sessions, steal cookies, perform actions on behalf of users, or deface the website. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (contributor or above), no user interaction, and scope change. The impact primarily affects confidentiality and integrity but not availability. No public exploits are known at this time, but the vulnerability is publicly disclosed and should be considered a significant risk for affected WordPress sites. The plugin is widely used for custom registration forms, login forms, user profiles, content restriction, and membership management, making it a critical component in many WordPress deployments. The vulnerability was reserved in November 2025 and published in December 2025 by Wordfence.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of user data and website content. Attackers with contributor-level access can inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, unauthorized actions, or data theft. This can undermine user trust, damage brand reputation, and lead to compliance violations under GDPR if personal data is compromised. Since the vulnerability affects membership and user management functionalities, organizations relying on this plugin for customer or employee portals are particularly at risk. The exploitation does not require user interaction but does require authenticated access, which may limit exposure but still presents a significant threat if contributor accounts are compromised or misused. The lack of availability impact means service disruption is unlikely, but the integrity and confidentiality risks remain substantial. European organizations with public-facing WordPress sites using this plugin should prioritize mitigation to prevent exploitation.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the wpeverest plugin vendor as soon as they are released to address CVE-2025-13367. 2. Until a patch is available, restrict contributor-level user permissions to the minimum necessary and audit existing contributor accounts for suspicious activity. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious shortcode attribute payloads targeting this vulnerability. 4. Employ additional input validation and output encoding on shortcode attributes at the application or server level to reduce injection risk. 5. Conduct regular security audits and penetration testing focused on WordPress plugins and user input handling. 6. Educate site administrators and content contributors about the risks of injecting untrusted content and enforce strict content policies. 7. Consider disabling or replacing the affected plugin with alternatives that follow secure coding practices if immediate patching is not feasible. 8. Monitor logs for unusual script injection attempts or anomalous contributor activity to detect early exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-18T17:27:04.615Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69401ef9d9bcdf3f3de1277e
Added to database: 12/15/2025, 2:45:13 PM
Last enriched: 12/22/2025, 3:57:00 PM
Last updated: 2/7/2026, 12:42:36 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.