CVE-2025-13682: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in phegman Trail Manager
The Trail Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-13682 is a stored cross-site scripting (XSS) vulnerability identified in the Trail Manager plugin for WordPress, developed by phegman. This vulnerability affects all versions up to and including 1.0.0. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of administrator-configured settings. An attacker with administrator-level permissions can inject arbitrary JavaScript code into the plugin's admin settings interface. Because this is a stored XSS, the malicious script is saved on the server and executed whenever any user accesses the affected page. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to post unfiltered HTML content. The CVSS v3.1 base score is 4.4, reflecting a medium severity with network attack vector, high attack complexity, high privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require manual intervention or plugin updates once available. The vulnerability is cataloged under CWE-79, which covers improper input neutralization leading to XSS attacks.
Potential Impact
The primary impact of CVE-2025-13682 is the potential execution of arbitrary JavaScript in the context of affected WordPress sites, which can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of users. Since exploitation requires administrator-level access, the immediate risk is limited to environments where an attacker has already compromised or gained elevated privileges. However, once exploited, the attacker can target other users, including site administrators, by injecting malicious scripts that execute in their browsers. This can compromise sensitive data confidentiality and integrity, such as stealing authentication tokens or modifying site content. The vulnerability does not affect availability directly but can facilitate further attacks that degrade service. Multi-site WordPress installations, often used by large organizations, educational institutions, and service providers, are particularly at risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks. Organizations relying on this plugin should consider the risk of insider threats or compromised admin accounts as vectors for exploitation.
Mitigation Recommendations
To mitigate CVE-2025-13682, organizations should first verify if they are running the Trail Manager plugin on multi-site WordPress installations or have unfiltered_html disabled. Immediate steps include restricting administrator access to trusted personnel only and auditing admin accounts for suspicious activity. Since no official patch is currently available, administrators should consider disabling or uninstalling the plugin temporarily to eliminate the attack surface. If disabling is not feasible, implement web application firewall (WAF) rules to detect and block suspicious script injection attempts in admin settings. Additionally, enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly monitor logs for unusual admin activity or unexpected changes in plugin settings. Once a vendor patch or update is released, apply it promptly. Educate administrators about the risks of injecting untrusted content and enforce strict input validation policies. Finally, maintain up-to-date backups to recover quickly if exploitation occurs.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Japan, South Korea
CVE-2025-13682: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in phegman Trail Manager
Description
The Trail Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13682 is a stored cross-site scripting (XSS) vulnerability identified in the Trail Manager plugin for WordPress, developed by phegman. This vulnerability affects all versions up to and including 1.0.0. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of administrator-configured settings. An attacker with administrator-level permissions can inject arbitrary JavaScript code into the plugin's admin settings interface. Because this is a stored XSS, the malicious script is saved on the server and executed whenever any user accesses the affected page. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to post unfiltered HTML content. The CVSS v3.1 base score is 4.4, reflecting a medium severity with network attack vector, high attack complexity, high privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require manual intervention or plugin updates once available. The vulnerability is cataloged under CWE-79, which covers improper input neutralization leading to XSS attacks.
Potential Impact
The primary impact of CVE-2025-13682 is the potential execution of arbitrary JavaScript in the context of affected WordPress sites, which can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of users. Since exploitation requires administrator-level access, the immediate risk is limited to environments where an attacker has already compromised or gained elevated privileges. However, once exploited, the attacker can target other users, including site administrators, by injecting malicious scripts that execute in their browsers. This can compromise sensitive data confidentiality and integrity, such as stealing authentication tokens or modifying site content. The vulnerability does not affect availability directly but can facilitate further attacks that degrade service. Multi-site WordPress installations, often used by large organizations, educational institutions, and service providers, are particularly at risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks. Organizations relying on this plugin should consider the risk of insider threats or compromised admin accounts as vectors for exploitation.
Mitigation Recommendations
To mitigate CVE-2025-13682, organizations should first verify if they are running the Trail Manager plugin on multi-site WordPress installations or have unfiltered_html disabled. Immediate steps include restricting administrator access to trusted personnel only and auditing admin accounts for suspicious activity. Since no official patch is currently available, administrators should consider disabling or uninstalling the plugin temporarily to eliminate the attack surface. If disabling is not feasible, implement web application firewall (WAF) rules to detect and block suspicious script injection attempts in admin settings. Additionally, enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly monitor logs for unusual admin activity or unexpected changes in plugin settings. Once a vendor patch or update is released, apply it promptly. Educate administrators about the risks of injecting untrusted content and enforce strict input validation policies. Finally, maintain up-to-date backups to recover quickly if exploitation occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T19:02:35.552Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6932a9b1f88dbe026c8e9fc5
Added to database: 12/5/2025, 9:45:21 AM
Last enriched: 2/27/2026, 10:10:05 AM
Last updated: 3/26/2026, 7:52:58 AM
Views: 144
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.