CVE-2025-13853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lnbadmin1 Nearby Now Reviews
CVE-2025-13853 is a stored Cross-Site Scripting (XSS) vulnerability in the Nearby Now Reviews WordPress plugin (lnbadmin1) affecting all versions up to 5. 2. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization in the 'data_tech' parameter of the nn-tech shortcode to inject malicious scripts. These scripts execute whenever any user views the infected page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with contributors who have editing rights. Mitigation involves promptly updating the plugin once a patch is released or applying strict input validation and output escaping in the shortcode handler. Countries with high WordPress adoption and active local businesses using review plugins, such as the UK, Germany, France, and the Netherlands, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-13853 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Nearby Now Reviews plugin for WordPress, developed by lnbadmin1. The vulnerability arises from improper neutralization of input during web page generation, specifically in the 'data_tech' parameter of the nn-tech shortcode. All plugin versions up to and including 5.2 fail to sufficiently sanitize and escape user-supplied input, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. When a page containing the injected shortcode is accessed, the malicious script executes in the context of the victim's browser. This can lead to session hijacking, privilege escalation, unauthorized actions, or defacement. The vulnerability requires authentication but no user interaction, and the scope is limited to sites using this plugin. The CVSS 3.1 score of 6.4 reflects a medium severity with network attack vector, low attack complexity, and partial confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites relying on this plugin for managing reviews. The lack of a patch at the time of reporting necessitates immediate mitigation efforts by site administrators.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution on websites that use the Nearby Now Reviews plugin, potentially compromising user sessions, stealing sensitive data, or defacing public-facing pages. This can damage brand reputation, reduce customer trust, and lead to regulatory compliance issues under GDPR if personal data is exposed. Attackers with low-level authenticated access can leverage this flaw to escalate privileges or conduct further attacks within the website environment. Organizations relying on WordPress for customer reviews or local business listings are particularly vulnerable. The medium severity rating indicates a moderate risk, but the ease of exploitation by authenticated contributors increases the threat level in environments with multiple content editors. The absence of known exploits suggests a window of opportunity for defenders to patch or mitigate before widespread abuse occurs.
Mitigation Recommendations
1. Monitor for an official patch from the plugin vendor and apply it immediately upon release. 2. Until a patch is available, restrict Contributor-level access to trusted users only and review user permissions to minimize risk. 3. Implement additional input validation and output escaping on the 'data_tech' parameter within the shortcode handler if custom development resources are available. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious script injection attempts targeting the nn-tech shortcode. 5. Conduct regular security audits and code reviews of WordPress plugins, especially those handling user-generated content. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content moderation policies. 7. Use Content Security Policy (CSP) headers to limit the impact of potential XSS by restricting script sources. 8. Maintain up-to-date backups to enable quick recovery if an attack occurs.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain
CVE-2025-13853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lnbadmin1 Nearby Now Reviews
Description
CVE-2025-13853 is a stored Cross-Site Scripting (XSS) vulnerability in the Nearby Now Reviews WordPress plugin (lnbadmin1) affecting all versions up to 5. 2. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization in the 'data_tech' parameter of the nn-tech shortcode to inject malicious scripts. These scripts execute whenever any user views the infected page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with contributors who have editing rights. Mitigation involves promptly updating the plugin once a patch is released or applying strict input validation and output escaping in the shortcode handler. Countries with high WordPress adoption and active local businesses using review plugins, such as the UK, Germany, France, and the Netherlands, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-13853 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Nearby Now Reviews plugin for WordPress, developed by lnbadmin1. The vulnerability arises from improper neutralization of input during web page generation, specifically in the 'data_tech' parameter of the nn-tech shortcode. All plugin versions up to and including 5.2 fail to sufficiently sanitize and escape user-supplied input, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. When a page containing the injected shortcode is accessed, the malicious script executes in the context of the victim's browser. This can lead to session hijacking, privilege escalation, unauthorized actions, or defacement. The vulnerability requires authentication but no user interaction, and the scope is limited to sites using this plugin. The CVSS 3.1 score of 6.4 reflects a medium severity with network attack vector, low attack complexity, and partial confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites relying on this plugin for managing reviews. The lack of a patch at the time of reporting necessitates immediate mitigation efforts by site administrators.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution on websites that use the Nearby Now Reviews plugin, potentially compromising user sessions, stealing sensitive data, or defacing public-facing pages. This can damage brand reputation, reduce customer trust, and lead to regulatory compliance issues under GDPR if personal data is exposed. Attackers with low-level authenticated access can leverage this flaw to escalate privileges or conduct further attacks within the website environment. Organizations relying on WordPress for customer reviews or local business listings are particularly vulnerable. The medium severity rating indicates a moderate risk, but the ease of exploitation by authenticated contributors increases the threat level in environments with multiple content editors. The absence of known exploits suggests a window of opportunity for defenders to patch or mitigate before widespread abuse occurs.
Mitigation Recommendations
1. Monitor for an official patch from the plugin vendor and apply it immediately upon release. 2. Until a patch is available, restrict Contributor-level access to trusted users only and review user permissions to minimize risk. 3. Implement additional input validation and output escaping on the 'data_tech' parameter within the shortcode handler if custom development resources are available. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious script injection attempts targeting the nn-tech shortcode. 5. Conduct regular security audits and code reviews of WordPress plugins, especially those handling user-generated content. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content moderation policies. 7. Use Content Security Policy (CSP) headers to limit the impact of potential XSS by restricting script sources. 8. Maintain up-to-date backups to enable quick recovery if an attack occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-01T20:21:37.258Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960c9cbecefc3cd7c16abb9
Added to database: 1/9/2026, 9:26:35 AM
Last enriched: 1/16/2026, 10:08:12 AM
Last updated: 2/7/2026, 1:52:45 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.