Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13525: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in listingthemes WP Directory Kit

0
Medium
VulnerabilityCVE-2025-13525cvecve-2025-13525cwe-79
Published: Thu Nov 27 2025 (11/27/2025, 05:31:56 UTC)
Source: CVE Database V5
Vendor/Project: listingthemes
Product: WP Directory Kit

Description

The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'order_by' parameter in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 11/27/2025, 05:57:48 UTC

Technical Analysis

CVE-2025-13525 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WP Directory Kit plugin for WordPress, specifically in the handling of the 'order_by' parameter. This vulnerability stems from insufficient sanitization and escaping of user-supplied input before it is included in dynamically generated web pages. Because the plugin fails to neutralize malicious scripts embedded in the 'order_by' parameter, an attacker can craft a URL containing JavaScript code that, when clicked by a user, executes in the victim's browser context. This reflected XSS does not require authentication, making it accessible to unauthenticated attackers. The vulnerability impacts all versions up to and including 1.4.5 of the plugin. The CVSS 3.1 base score of 6.1 reflects that the attack vector is network-based, with low attack complexity, no privileges required, but requires user interaction (clicking a malicious link). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable code, potentially impacting user sessions or data. The confidentiality and integrity of user data can be compromised, for example, through session hijacking, cookie theft, or phishing. Availability is not impacted. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-79, a common and well-understood web application security issue. Organizations using this plugin should consider immediate mitigations to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the WP Directory Kit plugin installed. Exploitation can lead to theft of user credentials, session tokens, or other sensitive information, enabling attackers to impersonate users or conduct further attacks such as phishing or privilege escalation. This is particularly concerning for organizations handling sensitive customer data or providing critical services via WordPress sites. The reflected XSS can undermine user trust and lead to reputational damage. Since the vulnerability requires user interaction, the impact depends on the ability of attackers to lure users into clicking malicious links, which can be facilitated by social engineering or phishing campaigns. The lack of a patch increases exposure time. European organizations with public-facing WordPress sites, especially those in sectors like e-commerce, finance, healthcare, and government, are at higher risk. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting user data, so exploitation could lead to compliance violations and fines.

Mitigation Recommendations

1. Immediately review and restrict the use of the 'order_by' parameter in URLs, disabling it if possible until a patch is available. 2. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'order_by' parameter, focusing on common XSS patterns. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 4. Educate users and administrators about the risks of clicking unsolicited links and encourage cautious behavior. 5. Monitor web server logs and traffic for suspicious requests containing script tags or unusual 'order_by' parameter values. 6. If feasible, apply manual input sanitization and output encoding in the plugin code as a temporary fix, ensuring all user inputs are properly escaped before rendering. 7. Stay alert for official patches or updates from the plugin vendor and apply them promptly once released. 8. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 9. Limit plugin usage to trusted environments and consider alternatives if the plugin is not actively maintained or patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-21T19:45:44.250Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927e4dfbdf69728cfe59424

Added to database: 11/27/2025, 5:42:55 AM

Last enriched: 11/27/2025, 5:57:48 AM

Last updated: 11/27/2025, 7:40:54 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats