CVE-2025-13861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linksoftware HTML Forms – Simple WordPress Forms Plugin
The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to and including 1.6.0 due to insufficient sanitization of fabricated file upload field metadata before displaying it in the WordPress admin dashboard. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute whenever an administrator accesses the form submissions page.
AI Analysis
Technical Summary
CVE-2025-13861 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the HTML Forms – Simple WordPress Forms Plugin developed by linksoftware. The vulnerability exists in all versions up to and including 1.6.0 due to improper sanitization of fabricated file upload field metadata before it is rendered in the WordPress admin dashboard. An unauthenticated attacker can exploit this by submitting maliciously crafted metadata that is stored and later executed as JavaScript when an administrator accesses the form submissions page. This attack vector does not require any authentication, making it easier for remote attackers to exploit. The vulnerability impacts the confidentiality and integrity of the administrator’s session and data, as malicious scripts can steal cookies, perform actions on behalf of the admin, or inject further malicious payloads. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction (admin visiting the page). The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component. No patches were linked at the time of publication, and no known exploits in the wild have been reported. The vulnerability highlights the risks of insufficient input validation and output encoding in WordPress plugins, especially those handling file uploads and admin interfaces.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that use the affected plugin. Successful exploitation can lead to administrative account compromise, unauthorized actions within the WordPress backend, and potential data leakage. This can result in defacement, data theft, or further malware deployment. Organizations handling sensitive customer data or critical business operations through WordPress sites are particularly vulnerable. The attack requires no authentication, increasing the attack surface. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the impact could be broad. Compromise of administrative accounts can also lead to supply chain risks if the WordPress site integrates with other internal systems. Additionally, GDPR compliance could be affected if personal data is exposed or mishandled due to this vulnerability.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the WordPress admin dashboard to trusted IP addresses or VPN users to reduce exposure. Administrators should avoid accessing the form submissions page until a patch is available. Implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the file upload metadata fields can provide temporary protection. Monitoring logs for suspicious POST requests to the form submission endpoints is recommended. Plugin developers and site administrators should prioritize releasing and applying patches that properly sanitize and encode all user-supplied metadata before rendering. As a temporary workaround, disabling or removing the vulnerable plugin can eliminate the attack vector. Regular backups and incident response plans should be reviewed to prepare for potential exploitation. Educating administrators about the risk of clicking untrusted links or accessing suspicious admin pages can reduce successful exploitation likelihood.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linksoftware HTML Forms – Simple WordPress Forms Plugin
Description
The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to and including 1.6.0 due to insufficient sanitization of fabricated file upload field metadata before displaying it in the WordPress admin dashboard. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute whenever an administrator accesses the form submissions page.
AI-Powered Analysis
Technical Analysis
CVE-2025-13861 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the HTML Forms – Simple WordPress Forms Plugin developed by linksoftware. The vulnerability exists in all versions up to and including 1.6.0 due to improper sanitization of fabricated file upload field metadata before it is rendered in the WordPress admin dashboard. An unauthenticated attacker can exploit this by submitting maliciously crafted metadata that is stored and later executed as JavaScript when an administrator accesses the form submissions page. This attack vector does not require any authentication, making it easier for remote attackers to exploit. The vulnerability impacts the confidentiality and integrity of the administrator’s session and data, as malicious scripts can steal cookies, perform actions on behalf of the admin, or inject further malicious payloads. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction (admin visiting the page). The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component. No patches were linked at the time of publication, and no known exploits in the wild have been reported. The vulnerability highlights the risks of insufficient input validation and output encoding in WordPress plugins, especially those handling file uploads and admin interfaces.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that use the affected plugin. Successful exploitation can lead to administrative account compromise, unauthorized actions within the WordPress backend, and potential data leakage. This can result in defacement, data theft, or further malware deployment. Organizations handling sensitive customer data or critical business operations through WordPress sites are particularly vulnerable. The attack requires no authentication, increasing the attack surface. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the impact could be broad. Compromise of administrative accounts can also lead to supply chain risks if the WordPress site integrates with other internal systems. Additionally, GDPR compliance could be affected if personal data is exposed or mishandled due to this vulnerability.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the WordPress admin dashboard to trusted IP addresses or VPN users to reduce exposure. Administrators should avoid accessing the form submissions page until a patch is available. Implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the file upload metadata fields can provide temporary protection. Monitoring logs for suspicious POST requests to the form submission endpoints is recommended. Plugin developers and site administrators should prioritize releasing and applying patches that properly sanitize and encode all user-supplied metadata before rendering. As a temporary workaround, disabling or removing the vulnerable plugin can eliminate the attack vector. Regular backups and incident response plans should be reviewed to prepare for potential exploitation. Educating administrators about the risk of clicking untrusted links or accessing suspicious admin pages can reduce successful exploitation likelihood.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-01T21:05:53.563Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69423560364d4dab9cc00c3e
Added to database: 12/17/2025, 4:45:20 AM
Last enriched: 12/24/2025, 5:59:21 AM
Last updated: 2/7/2026, 1:00:15 PM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.