CVE-2025-13731: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in posimyththemes Nexter Extension – Site Enhancements Toolkit
The Nexter Extension – Site Enhancements Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'nxt-year' shortcode in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-13731 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Nexter Extension – Site Enhancements Toolkit plugin for WordPress, maintained by posimyththemes. This vulnerability exists in all versions up to and including 4.4.1 due to improper neutralization of input during web page generation, specifically within the plugin's 'nxt-year' shortcode. The root cause is insufficient input sanitization and lack of proper output escaping, allowing an authenticated attacker with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages. Because the injected scripts are stored persistently, they execute every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires authentication but no user interaction beyond viewing the infected page. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required at the contributor level. The scope is changed because the vulnerability affects other users beyond the attacker. No public exploits or patches are currently available, emphasizing the need for proactive mitigation. This vulnerability falls under CWE-79, a common and impactful web security weakness. Given WordPress's widespread use, this issue poses a significant risk to many websites using this plugin for site enhancements.
Potential Impact
The impact of CVE-2025-13731 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the vulnerable site, which can lead to session hijacking, theft of sensitive user data such as cookies or credentials, unauthorized actions performed on behalf of users, and potential site defacement. Since the vulnerability is stored XSS, the malicious payload persists and affects all users who visit the compromised page, amplifying the attack's reach. Organizations relying on this plugin risk reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. The requirement for Contributor-level access limits exploitation to insiders or compromised accounts, but such roles are common in collaborative WordPress environments, increasing the attack surface. The vulnerability does not affect availability directly but can indirectly cause service disruptions if exploited for further attacks or site defacement.
Mitigation Recommendations
To mitigate CVE-2025-13731, organizations should first verify if they use the Nexter Extension – Site Enhancements Toolkit plugin and identify the version in use. Since no official patch is currently available, immediate steps include restricting Contributor-level and higher privileges to trusted users only, minimizing the number of users with such roles. Implement strict input validation and output escaping for the 'nxt-year' shortcode if custom development resources are available, or disable the shortcode entirely until a patch is released. Employ Web Application Firewalls (WAFs) with rules to detect and block typical XSS payloads targeting this plugin. Regularly audit user-generated content for suspicious scripts and monitor logs for unusual activity. Educate site administrators about the risks of granting elevated privileges and encourage the use of multi-factor authentication to reduce the risk of account compromise. Once a vendor patch is released, apply it promptly. Additionally, maintain regular backups to enable recovery in case of successful exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-13731: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in posimyththemes Nexter Extension – Site Enhancements Toolkit
Description
The Nexter Extension – Site Enhancements Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'nxt-year' shortcode in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13731 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Nexter Extension – Site Enhancements Toolkit plugin for WordPress, maintained by posimyththemes. This vulnerability exists in all versions up to and including 4.4.1 due to improper neutralization of input during web page generation, specifically within the plugin's 'nxt-year' shortcode. The root cause is insufficient input sanitization and lack of proper output escaping, allowing an authenticated attacker with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages. Because the injected scripts are stored persistently, they execute every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires authentication but no user interaction beyond viewing the infected page. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required at the contributor level. The scope is changed because the vulnerability affects other users beyond the attacker. No public exploits or patches are currently available, emphasizing the need for proactive mitigation. This vulnerability falls under CWE-79, a common and impactful web security weakness. Given WordPress's widespread use, this issue poses a significant risk to many websites using this plugin for site enhancements.
Potential Impact
The impact of CVE-2025-13731 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the vulnerable site, which can lead to session hijacking, theft of sensitive user data such as cookies or credentials, unauthorized actions performed on behalf of users, and potential site defacement. Since the vulnerability is stored XSS, the malicious payload persists and affects all users who visit the compromised page, amplifying the attack's reach. Organizations relying on this plugin risk reputational damage, loss of user trust, and potential regulatory consequences if user data is compromised. The requirement for Contributor-level access limits exploitation to insiders or compromised accounts, but such roles are common in collaborative WordPress environments, increasing the attack surface. The vulnerability does not affect availability directly but can indirectly cause service disruptions if exploited for further attacks or site defacement.
Mitigation Recommendations
To mitigate CVE-2025-13731, organizations should first verify if they use the Nexter Extension – Site Enhancements Toolkit plugin and identify the version in use. Since no official patch is currently available, immediate steps include restricting Contributor-level and higher privileges to trusted users only, minimizing the number of users with such roles. Implement strict input validation and output escaping for the 'nxt-year' shortcode if custom development resources are available, or disable the shortcode entirely until a patch is released. Employ Web Application Firewalls (WAFs) with rules to detect and block typical XSS payloads targeting this plugin. Regularly audit user-generated content for suspicious scripts and monitor logs for unusual activity. Educate site administrators about the risks of granting elevated privileges and encourage the use of multi-factor authentication to reduce the risk of account compromise. Once a vendor patch is released, apply it promptly. Additionally, maintain regular backups to enable recovery in case of successful exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-26T00:15:39.317Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692ef09b5ae7112264d5b08f
Added to database: 12/2/2025, 1:58:51 PM
Last enriched: 2/27/2026, 10:15:08 AM
Last updated: 3/25/2026, 12:05:47 AM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.