CVE-2025-13667: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tomiup WP Recipe Manager
CVE-2025-13667 is a stored Cross-Site Scripting (XSS) vulnerability in the WP Recipe Manager WordPress plugin, affecting all versions up to 1. 0. 0. It arises from improper sanitization and escaping of user input in the 'Skill Level' field, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using WordPress sites with this plugin are at risk, especially those with multiple contributors. Mitigation involves promptly updating or patching the plugin once available, restricting contributor privileges, and implementing web application firewalls with XSS protections.
AI Analysis
Technical Summary
CVE-2025-13667 is a stored Cross-Site Scripting vulnerability identified in the WP Recipe Manager plugin for WordPress, developed by tomiup. The flaw exists in all versions up to and including 1.0.0, specifically in the handling of the 'Skill Level' input field. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied data, allowing an attacker with Contributor-level or higher privileges to inject arbitrary JavaScript code into recipe pages. Because the malicious script is stored persistently, it executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of users. The attack vector requires network access and low attack complexity but does require authenticated access (Contributor or above). No user interaction is necessary for the payload to execute once the page is loaded. The vulnerability impacts confidentiality and integrity but not availability. The CVSS 3.1 score is 6.4, reflecting medium severity with a scope change due to the potential to affect other users viewing the injected content. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved in late 2025 and published in early 2026. This issue highlights the risks of insufficient input validation in WordPress plugins, especially those that allow multiple contributors to add content.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the WP Recipe Manager plugin installed. Organizations that allow multiple contributors to publish content on their sites are particularly vulnerable, as attackers can leverage Contributor-level access to inject malicious scripts. The impact includes potential theft of user credentials, session hijacking, unauthorized actions performed on behalf of users, and reputational damage due to defacement or malicious content delivery. While the vulnerability does not affect availability, the compromise of user data and trust can have significant business consequences, especially for e-commerce or community-driven sites. Given the widespread use of WordPress across Europe, particularly in small and medium enterprises and food-related businesses, the vulnerability could be exploited to target these sectors. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities after disclosure. The scope change in the CVSS vector indicates that the vulnerability can affect users beyond the initial attacker, increasing potential impact.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the WP Recipe Manager plugin and verify the version in use. 2. Apply any available patches or updates from the vendor as soon as they are released. If no official patch exists, consider temporarily disabling the plugin or restricting access to the 'Skill Level' input field. 3. Limit Contributor-level access strictly to trusted users and review user roles and permissions regularly to minimize the risk of malicious input. 4. Implement a Web Application Firewall (WAF) with robust XSS filtering capabilities to detect and block malicious script injections. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages. 6. Conduct regular security training for content contributors to raise awareness about safe input practices. 7. Monitor web server logs and user activity for signs of suspicious behavior or injection attempts. 8. Consider using security plugins that sanitize user input and output on WordPress sites. 9. Perform regular vulnerability scans and penetration tests focusing on input validation weaknesses. 10. Backup website data regularly to enable quick restoration in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-13667: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tomiup WP Recipe Manager
Description
CVE-2025-13667 is a stored Cross-Site Scripting (XSS) vulnerability in the WP Recipe Manager WordPress plugin, affecting all versions up to 1. 0. 0. It arises from improper sanitization and escaping of user input in the 'Skill Level' field, allowing authenticated users with Contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using WordPress sites with this plugin are at risk, especially those with multiple contributors. Mitigation involves promptly updating or patching the plugin once available, restricting contributor privileges, and implementing web application firewalls with XSS protections.
AI-Powered Analysis
Technical Analysis
CVE-2025-13667 is a stored Cross-Site Scripting vulnerability identified in the WP Recipe Manager plugin for WordPress, developed by tomiup. The flaw exists in all versions up to and including 1.0.0, specifically in the handling of the 'Skill Level' input field. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied data, allowing an attacker with Contributor-level or higher privileges to inject arbitrary JavaScript code into recipe pages. Because the malicious script is stored persistently, it executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of users. The attack vector requires network access and low attack complexity but does require authenticated access (Contributor or above). No user interaction is necessary for the payload to execute once the page is loaded. The vulnerability impacts confidentiality and integrity but not availability. The CVSS 3.1 score is 6.4, reflecting medium severity with a scope change due to the potential to affect other users viewing the injected content. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved in late 2025 and published in early 2026. This issue highlights the risks of insufficient input validation in WordPress plugins, especially those that allow multiple contributors to add content.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the WP Recipe Manager plugin installed. Organizations that allow multiple contributors to publish content on their sites are particularly vulnerable, as attackers can leverage Contributor-level access to inject malicious scripts. The impact includes potential theft of user credentials, session hijacking, unauthorized actions performed on behalf of users, and reputational damage due to defacement or malicious content delivery. While the vulnerability does not affect availability, the compromise of user data and trust can have significant business consequences, especially for e-commerce or community-driven sites. Given the widespread use of WordPress across Europe, particularly in small and medium enterprises and food-related businesses, the vulnerability could be exploited to target these sectors. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities after disclosure. The scope change in the CVSS vector indicates that the vulnerability can affect users beyond the initial attacker, increasing potential impact.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the WP Recipe Manager plugin and verify the version in use. 2. Apply any available patches or updates from the vendor as soon as they are released. If no official patch exists, consider temporarily disabling the plugin or restricting access to the 'Skill Level' input field. 3. Limit Contributor-level access strictly to trusted users and review user roles and permissions regularly to minimize the risk of malicious input. 4. Implement a Web Application Firewall (WAF) with robust XSS filtering capabilities to detect and block malicious script injections. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected web pages. 6. Conduct regular security training for content contributors to raise awareness about safe input practices. 7. Monitor web server logs and user activity for signs of suspicious behavior or injection attempts. 8. Consider using security plugins that sanitize user input and output on WordPress sites. 9. Perform regular vulnerability scans and penetration tests focusing on input validation weaknesses. 10. Backup website data regularly to enable quick restoration in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T16:38:36.070Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c107349d0379d7d565a
Added to database: 1/7/2026, 12:05:36 PM
Last enriched: 1/14/2026, 3:42:37 PM
Last updated: 2/5/2026, 10:20:47 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumCVE-2026-1294: CWE-918 Server-Side Request Forgery (SSRF) in bplugins All In One Image Viewer Block – Gutenberg block to create image viewer with hyperlink
HighCVE-2026-1271: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-14079: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2026-1319: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themeisle Robin Image Optimizer – Unlimited Image Optimization & WebP Converter
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.