CVE-2025-13525: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in listingthemes WP Directory Kit
The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'order_by' parameter in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13525 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WP Directory Kit plugin for WordPress, specifically in the handling of the 'order_by' parameter. This vulnerability stems from insufficient sanitization and escaping of user-supplied input before it is included in dynamically generated web pages. Because the plugin fails to neutralize malicious scripts embedded in the 'order_by' parameter, an attacker can craft a URL containing JavaScript code that, when clicked by a user, executes in the victim's browser context. This reflected XSS does not require authentication, making it accessible to unauthenticated attackers. The vulnerability impacts all versions up to and including 1.4.5 of the plugin. The CVSS 3.1 base score of 6.1 reflects that the attack vector is network-based, with low attack complexity, no privileges required, but requires user interaction (clicking a malicious link). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable code, potentially impacting user sessions or data. The confidentiality and integrity of user data can be compromised, for example, through session hijacking, cookie theft, or phishing. Availability is not impacted. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-79, a common and well-understood web application security issue. Organizations using this plugin should consider immediate mitigations to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the WP Directory Kit plugin installed. Exploitation can lead to theft of user credentials, session tokens, or other sensitive information, enabling attackers to impersonate users or conduct further attacks such as phishing or privilege escalation. This is particularly concerning for organizations handling sensitive customer data or providing critical services via WordPress sites. The reflected XSS can undermine user trust and lead to reputational damage. Since the vulnerability requires user interaction, the impact depends on the ability of attackers to lure users into clicking malicious links, which can be facilitated by social engineering or phishing campaigns. The lack of a patch increases exposure time. European organizations with public-facing WordPress sites, especially those in sectors like e-commerce, finance, healthcare, and government, are at higher risk. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting user data, so exploitation could lead to compliance violations and fines.
Mitigation Recommendations
1. Immediately review and restrict the use of the 'order_by' parameter in URLs, disabling it if possible until a patch is available. 2. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'order_by' parameter, focusing on common XSS patterns. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 4. Educate users and administrators about the risks of clicking unsolicited links and encourage cautious behavior. 5. Monitor web server logs and traffic for suspicious requests containing script tags or unusual 'order_by' parameter values. 6. If feasible, apply manual input sanitization and output encoding in the plugin code as a temporary fix, ensuring all user inputs are properly escaped before rendering. 7. Stay alert for official patches or updates from the plugin vendor and apply them promptly once released. 8. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 9. Limit plugin usage to trusted environments and consider alternatives if the plugin is not actively maintained or patched.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13525: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in listingthemes WP Directory Kit
Description
The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'order_by' parameter in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-13525 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WP Directory Kit plugin for WordPress, specifically in the handling of the 'order_by' parameter. This vulnerability stems from insufficient sanitization and escaping of user-supplied input before it is included in dynamically generated web pages. Because the plugin fails to neutralize malicious scripts embedded in the 'order_by' parameter, an attacker can craft a URL containing JavaScript code that, when clicked by a user, executes in the victim's browser context. This reflected XSS does not require authentication, making it accessible to unauthenticated attackers. The vulnerability impacts all versions up to and including 1.4.5 of the plugin. The CVSS 3.1 base score of 6.1 reflects that the attack vector is network-based, with low attack complexity, no privileges required, but requires user interaction (clicking a malicious link). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable code, potentially impacting user sessions or data. The confidentiality and integrity of user data can be compromised, for example, through session hijacking, cookie theft, or phishing. Availability is not impacted. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-79, a common and well-understood web application security issue. Organizations using this plugin should consider immediate mitigations to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the WP Directory Kit plugin installed. Exploitation can lead to theft of user credentials, session tokens, or other sensitive information, enabling attackers to impersonate users or conduct further attacks such as phishing or privilege escalation. This is particularly concerning for organizations handling sensitive customer data or providing critical services via WordPress sites. The reflected XSS can undermine user trust and lead to reputational damage. Since the vulnerability requires user interaction, the impact depends on the ability of attackers to lure users into clicking malicious links, which can be facilitated by social engineering or phishing campaigns. The lack of a patch increases exposure time. European organizations with public-facing WordPress sites, especially those in sectors like e-commerce, finance, healthcare, and government, are at higher risk. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting user data, so exploitation could lead to compliance violations and fines.
Mitigation Recommendations
1. Immediately review and restrict the use of the 'order_by' parameter in URLs, disabling it if possible until a patch is available. 2. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'order_by' parameter, focusing on common XSS patterns. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 4. Educate users and administrators about the risks of clicking unsolicited links and encourage cautious behavior. 5. Monitor web server logs and traffic for suspicious requests containing script tags or unusual 'order_by' parameter values. 6. If feasible, apply manual input sanitization and output encoding in the plugin code as a temporary fix, ensuring all user inputs are properly escaped before rendering. 7. Stay alert for official patches or updates from the plugin vendor and apply them promptly once released. 8. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 9. Limit plugin usage to trusted environments and consider alternatives if the plugin is not actively maintained or patched.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-21T19:45:44.250Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6927e4dfbdf69728cfe59424
Added to database: 11/27/2025, 5:42:55 AM
Last enriched: 11/27/2025, 5:57:48 AM
Last updated: 11/27/2025, 7:40:54 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13441: CWE-862 Missing Authorization in themesupport Hide Category by User Role for WooCommerce
MediumCVE-2025-13157: CWE-639 Authorization Bypass Through User-Controlled Key in qodeinteractive QODE Wishlist for WooCommerce
MediumCVE-2025-12758: Incomplete Filtering of One or More Instances of Special Elements in validator
HighCVE-2025-13143: CWE-352 Cross-Site Request Forgery (CSRF) in assafp Poll, Survey & Quiz Maker Plugin by Opinion Stage
MediumCVE-2025-12185: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in era404 StaffList
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.