Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13622: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in missi Jabbernotification

0
Medium
VulnerabilityCVE-2025-13622cvecve-2025-13622cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 05:31:25 UTC)
Source: CVE Database V5
Vendor/Project: missi
Product: Jabbernotification

Description

The Jabbernotification plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the admin.php PATH_INFO in all versions up to, and including, 0.99-RC2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/12/2025, 06:06:37 UTC

Technical Analysis

CVE-2025-13622 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Jabbernotification plugin for WordPress, affecting all versions up to and including 0.99-RC2. The root cause is insufficient sanitization and escaping of user-supplied input in the admin.php PATH_INFO parameter. This flaw allows unauthenticated attackers to craft malicious URLs containing arbitrary JavaScript code that, when clicked by an unsuspecting user, executes in the context of the victim's browser session. The vulnerability leverages the reflected XSS vector, meaning the injected script is not stored but reflected off the server in the response. The attack requires user interaction (clicking a malicious link) but no authentication or special privileges. The impact includes potential theft of session cookies, user impersonation, and manipulation of displayed content, compromising confidentiality and integrity of user data. The CVSS 3.1 base score is 6.1, reflecting network attack vector, low attack complexity, no privileges required, user interaction needed, and partial confidentiality and integrity impact. No patches are currently published, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites with administrative interfaces exposed to the internet, where attackers can target site administrators or privileged users. Given WordPress's widespread use in Europe, especially among SMEs and public sector websites, this vulnerability poses a tangible risk if unmitigated.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information such as authentication tokens or personal data through session hijacking. Attackers could also manipulate web page content to conduct phishing or social engineering attacks against employees or customers, potentially leading to further compromise. The reflected XSS nature means the attack is transient but can be highly effective against targeted users, especially administrators with elevated privileges. Public-facing WordPress sites using the vulnerable plugin are at risk of reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruption if attackers leverage the vulnerability to escalate privileges or deploy secondary attacks. The medium severity score indicates moderate risk, but the ease of exploitation and potential for user impersonation make timely mitigation critical. Organizations relying on this plugin should consider the threat significant, particularly those in sectors with high regulatory scrutiny or valuable digital assets.

Mitigation Recommendations

1. Monitor for and apply security patches from the plugin vendor immediately upon release. 2. Until patches are available, restrict access to the admin.php endpoint using IP whitelisting or VPN access to limit exposure. 3. Deploy a Web Application Firewall (WAF) with rules to detect and block reflected XSS attack patterns, especially targeting the PATH_INFO parameter. 4. Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script execution sources. 5. Educate users, particularly administrators, about the risks of clicking unsolicited links and phishing attempts. 6. Regularly audit WordPress plugins for vulnerabilities and remove or replace unsupported or unmaintained plugins. 7. Enable multi-factor authentication (MFA) for WordPress admin accounts to mitigate the impact of session hijacking. 8. Monitor logs for suspicious requests targeting admin.php with unusual PATH_INFO values to detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-24T20:44:35.680Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327173f88dbe026c7799c8

Added to database: 12/5/2025, 5:45:23 AM

Last enriched: 12/12/2025, 6:06:37 AM

Last updated: 2/7/2026, 2:32:37 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats