Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13860: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webradykal Easy Jump Links Menus

0
Medium
VulnerabilityCVE-2025-13860cvecve-2025-13860cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 05:31:29 UTC)
Source: CVE Database V5
Vendor/Project: webradykal
Product: Easy Jump Links Menus

Description

CVE-2025-13860 is a stored Cross-Site Scripting (XSS) vulnerability in the Easy Jump Links Menus WordPress plugin by webradykal, affecting all versions up to 1. 0. 0. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization of the 'h_tags' parameter to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no user interaction required but limited to authenticated users. No known public exploits exist yet. European organizations using this plugin on WordPress sites are at risk, especially those with Contributor-level user roles. Mitigation involves restricting Contributor privileges, monitoring plugin updates, and applying custom input validation or output escaping until a patch is released.

AI-Powered Analysis

AILast updated: 12/05/2025, 06:01:17 UTC

Technical Analysis

CVE-2025-13860 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Jump Links Menus plugin for WordPress, developed by webradykal. The flaw arises from improper neutralization of input during web page generation, specifically through the 'h_tags' parameter. Versions up to and including 1.0.0 fail to adequately sanitize or escape this input, allowing authenticated users with Contributor-level permissions or higher to inject arbitrary JavaScript code into pages. This malicious code is stored persistently and executed in the browsers of any users who visit the infected pages, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability requires no user interaction beyond page access but does require authenticated access with at least Contributor privileges, which are commonly granted in collaborative WordPress environments. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) reflects network attack vector, low attack complexity, privileges required, no user interaction, scope change, and limited confidentiality and integrity impacts without availability impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed. This issue is classified under CWE-79, indicating improper input neutralization during web page generation. The vulnerability affects all plugin versions up to 1.0.0, which may be widely deployed in WordPress installations used by European organizations for content management and web publishing.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web applications running WordPress with the Easy Jump Links Menus plugin. Attackers with Contributor-level access can inject persistent malicious scripts, which may lead to session hijacking, unauthorized actions, or data theft from users who visit compromised pages. This can result in reputational damage, regulatory non-compliance (especially under GDPR), and potential financial losses. Since the vulnerability affects the scope of the WordPress site and can impact all users accessing the infected pages, the risk extends beyond the initial attacker. Organizations with collaborative content management environments, where multiple users have Contributor or higher roles, are particularly vulnerable. The lack of a patch and absence of known exploits suggest a window of exposure, emphasizing the need for proactive mitigation. The medium CVSS score reflects moderate severity but the potential for exploitation in targeted attacks against European entities with valuable web assets.

Mitigation Recommendations

1. Immediately review and restrict Contributor-level and higher user permissions to trusted personnel only, minimizing the risk of malicious input injection. 2. Implement additional input validation and output escaping controls at the web application or WAF level to sanitize the 'h_tags' parameter before rendering. 3. Monitor WordPress plugin repositories and vendor communications for official patches or updates addressing this vulnerability and apply them promptly upon release. 4. Conduct regular security audits and code reviews of installed plugins to detect similar input sanitization issues. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content submission guidelines. 7. Use security plugins that can detect and block XSS payloads or anomalous user behavior. 8. Consider temporarily disabling or replacing the Easy Jump Links Menus plugin if feasible until a secure version is available. These steps go beyond generic advice by focusing on access control, layered defenses, and proactive monitoring tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-01T21:04:57.378Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327173f88dbe026c7799da

Added to database: 12/5/2025, 5:45:23 AM

Last enriched: 12/5/2025, 6:01:17 AM

Last updated: 12/5/2025, 6:47:43 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats