CVE-2025-13740: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in someguy9 Lightweight Accordion
The Lightweight Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `lightweight-accordion` shortcode in all versions up to, and including, 1.5.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-13740 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Lightweight Accordion plugin for WordPress, versions up to and including 1.5.20. The vulnerability stems from improper neutralization of input during web page generation, specifically in the handling of the plugin's `lightweight-accordion` shortcode attributes. Authenticated users with contributor-level permissions or higher can inject arbitrary JavaScript code into pages by exploiting insufficient input sanitization and lack of proper output escaping. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The vulnerability is classified under CWE-79 and has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the contributor level, with no user interaction needed beyond page access. The scope is changed as the vulnerability affects other users beyond the attacker. No patches or official fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content or shortcode attributes to be rendered without proper sanitization.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the Lightweight Accordion plugin on WordPress. Exploitation can lead to unauthorized script execution in the context of affected websites, risking user session hijacking, data theft, defacement, or further compromise of site integrity. This can damage organizational reputation, lead to data breaches involving personal or customer data protected under GDPR, and potentially cause service disruptions. Since the attack requires contributor-level access, insider threats or compromised accounts are the most likely vectors. Organizations with public-facing WordPress sites that rely on this plugin for content presentation are particularly vulnerable. The impact extends to any users visiting infected pages, including customers and employees, increasing the risk of lateral attacks or phishing. The medium CVSS score reflects that while the vulnerability is not trivially exploitable by unauthenticated attackers, the consequences of successful exploitation can be significant, especially in sectors like e-commerce, media, and public services prevalent in Europe.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Lightweight Accordion plugin and its version. Until an official patch is released, practical mitigations include: restricting contributor-level permissions to trusted users only; implementing Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute inputs; employing Content Security Policy (CSP) headers to limit script execution sources; sanitizing and validating all user-generated content before it is rendered; monitoring logs for unusual shortcode usage or script injections; and educating content contributors about the risks of injecting untrusted content. Additionally, organizations should consider temporarily disabling or removing the plugin if it is not essential. Regular backups and incident response plans should be updated to quickly recover from potential exploitation. Once a patch is available, prompt application is critical. Continuous monitoring for updates from the plugin vendor and WordPress security advisories is recommended.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-13740: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in someguy9 Lightweight Accordion
Description
The Lightweight Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `lightweight-accordion` shortcode in all versions up to, and including, 1.5.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-13740 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Lightweight Accordion plugin for WordPress, versions up to and including 1.5.20. The vulnerability stems from improper neutralization of input during web page generation, specifically in the handling of the plugin's `lightweight-accordion` shortcode attributes. Authenticated users with contributor-level permissions or higher can inject arbitrary JavaScript code into pages by exploiting insufficient input sanitization and lack of proper output escaping. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The vulnerability is classified under CWE-79 and has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the contributor level, with no user interaction needed beyond page access. The scope is changed as the vulnerability affects other users beyond the attacker. No patches or official fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content or shortcode attributes to be rendered without proper sanitization.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the Lightweight Accordion plugin on WordPress. Exploitation can lead to unauthorized script execution in the context of affected websites, risking user session hijacking, data theft, defacement, or further compromise of site integrity. This can damage organizational reputation, lead to data breaches involving personal or customer data protected under GDPR, and potentially cause service disruptions. Since the attack requires contributor-level access, insider threats or compromised accounts are the most likely vectors. Organizations with public-facing WordPress sites that rely on this plugin for content presentation are particularly vulnerable. The impact extends to any users visiting infected pages, including customers and employees, increasing the risk of lateral attacks or phishing. The medium CVSS score reflects that while the vulnerability is not trivially exploitable by unauthenticated attackers, the consequences of successful exploitation can be significant, especially in sectors like e-commerce, media, and public services prevalent in Europe.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Lightweight Accordion plugin and its version. Until an official patch is released, practical mitigations include: restricting contributor-level permissions to trusted users only; implementing Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute inputs; employing Content Security Policy (CSP) headers to limit script execution sources; sanitizing and validating all user-generated content before it is rendered; monitoring logs for unusual shortcode usage or script injections; and educating content contributors about the risks of injecting untrusted content. Additionally, organizations should consider temporarily disabling or removing the plugin if it is not essential. Regular backups and incident response plans should be updated to quickly recover from potential exploitation. Once a patch is available, prompt application is critical. Continuous monitoring for updates from the plugin vendor and WordPress security advisories is recommended.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-26T13:03:03.787Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693f87d9d9bcdf3f3da2a963
Added to database: 12/15/2025, 4:00:25 AM
Last enriched: 12/22/2025, 4:57:19 AM
Last updated: 2/5/2026, 12:39:36 AM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2026-1895: Improper Access Controls in WeKan
MediumCVE-2025-22873: CWE-23: Relative Path Traversal in Go standard library os
MediumCVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.