Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13705: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in blakelong Custom Frames

0
Medium
VulnerabilityCVE-2025-13705cvecve-2025-13705cwe-79
Published: Sat Dec 13 2025 (12/13/2025, 04:31:25 UTC)
Source: CVE Database V5
Vendor/Project: blakelong
Product: Custom Frames

Description

The Custom Frames plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter of the 'customframe' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 12/13/2025, 05:07:43 UTC

Technical Analysis

CVE-2025-13705 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Custom Frames plugin for WordPress, developed by blakelong. The vulnerability exists due to improper neutralization of input during web page generation, specifically in the handling of the 'class' parameter within the 'customframe' shortcode. All versions up to and including 1.0.1 are affected. An attacker with authenticated access at the Contributor level or higher can inject arbitrary JavaScript code into pages by manipulating this parameter. Because the injected scripts are stored and rendered whenever the page is accessed, this can lead to persistent XSS attacks impacting any user who views the compromised content. The vulnerability is classified under CWE-79, indicating improper input sanitization and output escaping. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and a scope change affecting confidentiality and integrity but not availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those that allow multiple contributors to publish content. The exploitation can lead to session hijacking, unauthorized actions on behalf of users, or distribution of malware. The lack of a patch at the time of reporting necessitates immediate attention to mitigate risk.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily to websites and web applications running WordPress with the Custom Frames plugin installed. The ability for authenticated contributors to inject persistent malicious scripts can compromise the confidentiality and integrity of user sessions and data. This can lead to unauthorized access, data theft, defacement, or distribution of malware to site visitors. Organizations relying on WordPress for content management, especially those with multiple contributors or editors, are at higher risk. The impact is heightened for sectors with strict data protection regulations such as GDPR, where data breaches could result in regulatory penalties and reputational damage. Additionally, compromised websites can be leveraged as attack vectors against customers or partners, amplifying the threat. The medium severity score reflects the need for timely remediation but indicates that exploitation requires some level of privilege, limiting immediate widespread impact. However, given WordPress's popularity across Europe, the potential attack surface is significant.

Mitigation Recommendations

1. Monitor the vendor’s official channels for a security patch and apply updates immediately once available. 2. Until a patch is released, restrict Contributor-level access or higher to trusted users only, minimizing the risk of malicious script injection. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'class' parameter in the 'customframe' shortcode. 4. Employ additional input validation and output encoding on the server side to sanitize the 'class' parameter, ensuring no executable scripts can be injected. 5. Conduct regular security audits and code reviews of custom plugins and shortcodes to identify similar vulnerabilities. 6. Educate content contributors about safe content publishing practices and the risks of injecting untrusted code. 7. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected websites. 8. Monitor website logs and user activity for signs of exploitation or unusual behavior related to content editing and page rendering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T21:45:55.293Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a501c

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 12/13/2025, 5:07:43 AM

Last updated: 12/14/2025, 4:10:47 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats