CVE-2025-13853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lnbadmin1 Nearby Now Reviews
The Nearby Now Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data_tech' parameter of the nn-tech shortcode in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-13853 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Nearby Now Reviews plugin for WordPress, developed by lnbadmin1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically through the 'data_tech' parameter of the nn-tech shortcode. In all versions up to and including 5.2, the plugin fails to sufficiently sanitize and escape user-supplied input, allowing authenticated users with Contributor-level privileges or higher to inject arbitrary JavaScript code. Because the injected scripts are stored persistently, they execute whenever any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions within the context of the victim's browser session. The vulnerability requires no user interaction beyond visiting the infected page, and the attacker only needs Contributor-level access, which is a relatively low privilege level in WordPress. The CVSS v3.1 score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to websites using this plugin, especially those with multiple contributors or editors. The lack of patches at the time of reporting necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution on their WordPress sites, resulting in session hijacking, defacement, phishing, or distribution of malware to site visitors. Confidentiality is impacted as attackers can steal sensitive user data or authentication tokens. Integrity is compromised through unauthorized content modification, and availability could be indirectly affected if the site is defaced or blacklisted by browsers or search engines. Organizations relying on WordPress for customer engagement, e-commerce, or internal communications may suffer reputational damage and regulatory consequences under GDPR if user data is exposed. The requirement for Contributor-level access means insider threats or compromised accounts can be leveraged to exploit this vulnerability, increasing risk in collaborative environments. The medium severity score indicates a moderate but actionable threat that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher user roles to trusted personnel only, minimizing the risk of malicious input. 2. Monitor and audit user-generated content, especially inputs to the nn-tech shortcode, for suspicious scripts or anomalies. 3. Implement Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting the 'data_tech' parameter. 4. Apply strict Content Security Policy (CSP) headers to limit script execution sources and reduce impact of injected scripts. 5. Regularly update the Nearby Now Reviews plugin as soon as the vendor releases a patch addressing this vulnerability. 6. Employ additional input validation and output encoding plugins or custom code to sanitize shortcode parameters. 7. Educate content contributors about safe input practices and the risks of injecting scripts. 8. Conduct periodic security scans and penetration tests focusing on WordPress plugins and user input vectors.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lnbadmin1 Nearby Now Reviews
Description
The Nearby Now Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data_tech' parameter of the nn-tech shortcode in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-13853 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Nearby Now Reviews plugin for WordPress, developed by lnbadmin1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically through the 'data_tech' parameter of the nn-tech shortcode. In all versions up to and including 5.2, the plugin fails to sufficiently sanitize and escape user-supplied input, allowing authenticated users with Contributor-level privileges or higher to inject arbitrary JavaScript code. Because the injected scripts are stored persistently, they execute whenever any user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions within the context of the victim's browser session. The vulnerability requires no user interaction beyond visiting the infected page, and the attacker only needs Contributor-level access, which is a relatively low privilege level in WordPress. The CVSS v3.1 score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to websites using this plugin, especially those with multiple contributors or editors. The lack of patches at the time of reporting necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution on their WordPress sites, resulting in session hijacking, defacement, phishing, or distribution of malware to site visitors. Confidentiality is impacted as attackers can steal sensitive user data or authentication tokens. Integrity is compromised through unauthorized content modification, and availability could be indirectly affected if the site is defaced or blacklisted by browsers or search engines. Organizations relying on WordPress for customer engagement, e-commerce, or internal communications may suffer reputational damage and regulatory consequences under GDPR if user data is exposed. The requirement for Contributor-level access means insider threats or compromised accounts can be leveraged to exploit this vulnerability, increasing risk in collaborative environments. The medium severity score indicates a moderate but actionable threat that should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher user roles to trusted personnel only, minimizing the risk of malicious input. 2. Monitor and audit user-generated content, especially inputs to the nn-tech shortcode, for suspicious scripts or anomalies. 3. Implement Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting the 'data_tech' parameter. 4. Apply strict Content Security Policy (CSP) headers to limit script execution sources and reduce impact of injected scripts. 5. Regularly update the Nearby Now Reviews plugin as soon as the vendor releases a patch addressing this vulnerability. 6. Employ additional input validation and output encoding plugins or custom code to sanitize shortcode parameters. 7. Educate content contributors about safe input practices and the risks of injecting scripts. 8. Conduct periodic security scans and penetration tests focusing on WordPress plugins and user input vectors.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-01T20:21:37.258Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960c9cbecefc3cd7c16abb9
Added to database: 1/9/2026, 9:26:35 AM
Last enriched: 1/9/2026, 9:41:23 AM
Last updated: 1/10/2026, 7:16:50 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.