CVE-2025-13860: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webradykal Easy Jump Links Menus
CVE-2025-13860 is a stored Cross-Site Scripting (XSS) vulnerability in the Easy Jump Links Menus WordPress plugin by webradykal, affecting all versions up to 1. 0. 0. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization of the 'h_tags' parameter to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no user interaction required but limited to authenticated users. No known public exploits exist yet. European organizations using this plugin on WordPress sites are at risk, especially those with Contributor-level user roles. Mitigation involves restricting Contributor privileges, monitoring plugin updates, and applying custom input validation or output escaping until a patch is released.
AI Analysis
Technical Summary
CVE-2025-13860 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Jump Links Menus plugin for WordPress, developed by webradykal. The flaw arises from improper neutralization of input during web page generation, specifically through the 'h_tags' parameter. Versions up to and including 1.0.0 fail to adequately sanitize or escape this input, allowing authenticated users with Contributor-level permissions or higher to inject arbitrary JavaScript code into pages. This malicious code is stored persistently and executed in the browsers of any users who visit the infected pages, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires no user interaction beyond page access but does require authenticated access with at least Contributor privileges, which are commonly granted in collaborative WordPress environments. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, privileges required, no user interaction, scope change, and limited confidentiality and integrity impacts without availability impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed. This issue is classified under CWE-79, indicating improper input neutralization during web page generation. The vulnerability affects all plugin versions up to 1.0.0, which may be widely deployed in WordPress installations used by European organizations for content management and web publishing.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web applications running WordPress with the Easy Jump Links Menus plugin. Attackers with Contributor-level access can inject persistent malicious scripts, which may lead to session hijacking, unauthorized actions, or data theft from users who visit compromised pages. This can result in reputational damage, regulatory non-compliance (especially under GDPR), and potential financial losses. Since the vulnerability affects the scope of the WordPress site and can impact all users accessing the infected pages, the risk extends beyond the initial attacker. Organizations with collaborative content management environments, where multiple users have Contributor or higher roles, are particularly vulnerable. The lack of a patch and absence of known exploits suggest a window of exposure, emphasizing the need for proactive mitigation. The medium CVSS score reflects moderate severity but the potential for exploitation in targeted attacks against European entities with valuable web assets.
Mitigation Recommendations
1. Immediately review and restrict Contributor-level and higher user permissions to trusted personnel only, minimizing the risk of malicious input injection. 2. Implement additional input validation and output escaping controls at the web application or WAF level to sanitize the 'h_tags' parameter before rendering. 3. Monitor WordPress plugin repositories and vendor communications for official patches or updates addressing this vulnerability and apply them promptly upon release. 4. Conduct regular security audits and code reviews of installed plugins to detect similar input sanitization issues. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content submission guidelines. 7. Use security plugins that can detect and block XSS payloads or anomalous user behavior. 8. Consider temporarily disabling or replacing the Easy Jump Links Menus plugin if feasible until a secure version is available. These steps go beyond generic advice by focusing on access control, layered defenses, and proactive monitoring tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13860: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webradykal Easy Jump Links Menus
Description
CVE-2025-13860 is a stored Cross-Site Scripting (XSS) vulnerability in the Easy Jump Links Menus WordPress plugin by webradykal, affecting all versions up to 1. 0. 0. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization of the 'h_tags' parameter to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no user interaction required but limited to authenticated users. No known public exploits exist yet. European organizations using this plugin on WordPress sites are at risk, especially those with Contributor-level user roles. Mitigation involves restricting Contributor privileges, monitoring plugin updates, and applying custom input validation or output escaping until a patch is released.
AI-Powered Analysis
Technical Analysis
CVE-2025-13860 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Jump Links Menus plugin for WordPress, developed by webradykal. The flaw arises from improper neutralization of input during web page generation, specifically through the 'h_tags' parameter. Versions up to and including 1.0.0 fail to adequately sanitize or escape this input, allowing authenticated users with Contributor-level permissions or higher to inject arbitrary JavaScript code into pages. This malicious code is stored persistently and executed in the browsers of any users who visit the infected pages, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires no user interaction beyond page access but does require authenticated access with at least Contributor privileges, which are commonly granted in collaborative WordPress environments. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, privileges required, no user interaction, scope change, and limited confidentiality and integrity impacts without availability impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed. This issue is classified under CWE-79, indicating improper input neutralization during web page generation. The vulnerability affects all plugin versions up to 1.0.0, which may be widely deployed in WordPress installations used by European organizations for content management and web publishing.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web applications running WordPress with the Easy Jump Links Menus plugin. Attackers with Contributor-level access can inject persistent malicious scripts, which may lead to session hijacking, unauthorized actions, or data theft from users who visit compromised pages. This can result in reputational damage, regulatory non-compliance (especially under GDPR), and potential financial losses. Since the vulnerability affects the scope of the WordPress site and can impact all users accessing the infected pages, the risk extends beyond the initial attacker. Organizations with collaborative content management environments, where multiple users have Contributor or higher roles, are particularly vulnerable. The lack of a patch and absence of known exploits suggest a window of exposure, emphasizing the need for proactive mitigation. The medium CVSS score reflects moderate severity but the potential for exploitation in targeted attacks against European entities with valuable web assets.
Mitigation Recommendations
1. Immediately review and restrict Contributor-level and higher user permissions to trusted personnel only, minimizing the risk of malicious input injection. 2. Implement additional input validation and output escaping controls at the web application or WAF level to sanitize the 'h_tags' parameter before rendering. 3. Monitor WordPress plugin repositories and vendor communications for official patches or updates addressing this vulnerability and apply them promptly upon release. 4. Conduct regular security audits and code reviews of installed plugins to detect similar input sanitization issues. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content submission guidelines. 7. Use security plugins that can detect and block XSS payloads or anomalous user behavior. 8. Consider temporarily disabling or replacing the Easy Jump Links Menus plugin if feasible until a secure version is available. These steps go beyond generic advice by focusing on access control, layered defenses, and proactive monitoring tailored to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-01T21:04:57.378Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327173f88dbe026c7799da
Added to database: 12/5/2025, 5:45:23 AM
Last enriched: 12/5/2025, 6:01:17 AM
Last updated: 12/5/2025, 6:47:43 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13515: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in danrajkumar Nouri.sh Newsletter
MediumCVE-2025-12374: CWE-287 Improper Authentication in pickplugins User Verification by PickPlugins
CriticalCVE-2025-12373: CWE-352 Cross-Site Request Forgery (CSRF) in torod Torod – The smart shipping and delivery portal for e-shops and retailers
MediumCVE-2025-12355: CWE-862 Missing Authorization in bigmaster Payaza
MediumCVE-2025-12354: CWE-862 Missing Authorization in dojodigital Live CSS Preview
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.