CVE-2025-13625: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in switch2mac WP-SOS-Donate Donation Sidebar Plugin
The WP-SOS-Donate Donation Sidebar Plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-13625 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WP-SOS-Donate Donation Sidebar Plugin for WordPress, maintained by switch2mac. The vulnerability stems from improper neutralization of input during web page generation, specifically via the $_SERVER['PHP_SELF'] parameter, which is used without adequate sanitization or output escaping. This allows an unauthenticated attacker to craft a malicious URL containing executable JavaScript code that, when clicked by a victim, executes in the context of the vulnerable website. The plugin versions up to and including 0.9.2 are affected. The vulnerability is classified under CWE-79, indicating a failure to properly sanitize user-controllable input. The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed (S:C) because the vulnerability can affect resources beyond the vulnerable component, potentially impacting user confidentiality and integrity. No known exploits have been reported in the wild as of the publication date. The vulnerability primarily risks the confidentiality and integrity of user data by enabling session hijacking, phishing, or defacement attacks. The plugin is commonly used on WordPress sites that accept donations, often public-facing, increasing exposure. The lack of a patch at the time of reporting necessitates interim mitigation strategies.
Potential Impact
The impact of CVE-2025-13625 includes potential theft of sensitive user information such as session cookies, enabling attackers to impersonate users or administrators. Attackers can also manipulate web page content to conduct phishing attacks or spread malware. Although availability is not directly affected, the trustworthiness and integrity of affected websites can be severely compromised, leading to reputational damage and loss of donor confidence. Organizations relying on the WP-SOS-Donate plugin for fundraising or donation management face risks of unauthorized access and data leakage. The vulnerability's ease of exploitation—requiring only a crafted URL and user interaction—makes it a practical threat, especially for sites with high visitor traffic. The scope change means that the impact can extend beyond the plugin itself, affecting the entire WordPress site and its users. This can have cascading effects on organizational security posture and compliance with data protection regulations.
Mitigation Recommendations
Organizations should prioritize updating the WP-SOS-Donate plugin to a patched version once released by the vendor. Until a patch is available, implement strict input validation and output encoding for the $_SERVER['PHP_SELF'] parameter to neutralize malicious scripts. Employ Web Application Firewalls (WAFs) with rules designed to detect and block reflected XSS attempts targeting this parameter. Educate users and administrators about the risks of clicking suspicious links, especially those purporting to originate from trusted donation sites. Review and harden Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS. Conduct regular security audits and penetration testing focused on input handling in WordPress plugins. Disable or remove the WP-SOS-Donate plugin if it is not essential, or replace it with alternative donation plugins with a stronger security track record. Monitor web server logs for unusual requests to the PHP_SELF parameter that may indicate exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2025-13625: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in switch2mac WP-SOS-Donate Donation Sidebar Plugin
Description
The WP-SOS-Donate Donation Sidebar Plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 0.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13625 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the WP-SOS-Donate Donation Sidebar Plugin for WordPress, maintained by switch2mac. The vulnerability stems from improper neutralization of input during web page generation, specifically via the $_SERVER['PHP_SELF'] parameter, which is used without adequate sanitization or output escaping. This allows an unauthenticated attacker to craft a malicious URL containing executable JavaScript code that, when clicked by a victim, executes in the context of the vulnerable website. The plugin versions up to and including 0.9.2 are affected. The vulnerability is classified under CWE-79, indicating a failure to properly sanitize user-controllable input. The CVSS 3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed (S:C) because the vulnerability can affect resources beyond the vulnerable component, potentially impacting user confidentiality and integrity. No known exploits have been reported in the wild as of the publication date. The vulnerability primarily risks the confidentiality and integrity of user data by enabling session hijacking, phishing, or defacement attacks. The plugin is commonly used on WordPress sites that accept donations, often public-facing, increasing exposure. The lack of a patch at the time of reporting necessitates interim mitigation strategies.
Potential Impact
The impact of CVE-2025-13625 includes potential theft of sensitive user information such as session cookies, enabling attackers to impersonate users or administrators. Attackers can also manipulate web page content to conduct phishing attacks or spread malware. Although availability is not directly affected, the trustworthiness and integrity of affected websites can be severely compromised, leading to reputational damage and loss of donor confidence. Organizations relying on the WP-SOS-Donate plugin for fundraising or donation management face risks of unauthorized access and data leakage. The vulnerability's ease of exploitation—requiring only a crafted URL and user interaction—makes it a practical threat, especially for sites with high visitor traffic. The scope change means that the impact can extend beyond the plugin itself, affecting the entire WordPress site and its users. This can have cascading effects on organizational security posture and compliance with data protection regulations.
Mitigation Recommendations
Organizations should prioritize updating the WP-SOS-Donate plugin to a patched version once released by the vendor. Until a patch is available, implement strict input validation and output encoding for the $_SERVER['PHP_SELF'] parameter to neutralize malicious scripts. Employ Web Application Firewalls (WAFs) with rules designed to detect and block reflected XSS attempts targeting this parameter. Educate users and administrators about the risks of clicking suspicious links, especially those purporting to originate from trusted donation sites. Review and harden Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS. Conduct regular security audits and penetration testing focused on input handling in WordPress plugins. Disable or remove the WP-SOS-Donate plugin if it is not essential, or replace it with alternative donation plugins with a stronger security track record. Monitor web server logs for unusual requests to the PHP_SELF parameter that may indicate exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-24T21:15:13.302Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327173f88dbe026c7799d4
Added to database: 12/5/2025, 5:45:23 AM
Last enriched: 2/27/2026, 10:05:06 AM
Last updated: 3/25/2026, 2:44:30 AM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.