Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linksoftware HTML Forms – Simple WordPress Forms Plugin

0
Medium
VulnerabilityCVE-2025-13861cvecve-2025-13861cwe-79
Published: Wed Dec 17 2025 (12/17/2025, 04:31:30 UTC)
Source: CVE Database V5
Vendor/Project: linksoftware
Product: HTML Forms – Simple WordPress Forms Plugin

Description

The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to and including 1.6.0 due to insufficient sanitization of fabricated file upload field metadata before displaying it in the WordPress admin dashboard. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute whenever an administrator accesses the form submissions page.

AI-Powered Analysis

AILast updated: 12/24/2025, 05:59:21 UTC

Technical Analysis

CVE-2025-13861 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the HTML Forms – Simple WordPress Forms Plugin developed by linksoftware. The vulnerability exists in all versions up to and including 1.6.0 due to improper sanitization of fabricated file upload field metadata before it is rendered in the WordPress admin dashboard. An unauthenticated attacker can exploit this by submitting maliciously crafted metadata that is stored and later executed as JavaScript when an administrator accesses the form submissions page. This attack vector does not require any authentication, making it easier for remote attackers to exploit. The vulnerability impacts the confidentiality and integrity of the administrator’s session and data, as malicious scripts can steal cookies, perform actions on behalf of the admin, or inject further malicious payloads. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction (admin visiting the page). The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component. No patches were linked at the time of publication, and no known exploits in the wild have been reported. The vulnerability highlights the risks of insufficient input validation and output encoding in WordPress plugins, especially those handling file uploads and admin interfaces.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress-based websites that use the affected plugin. Successful exploitation can lead to administrative account compromise, unauthorized actions within the WordPress backend, and potential data leakage. This can result in defacement, data theft, or further malware deployment. Organizations handling sensitive customer data or critical business operations through WordPress sites are particularly vulnerable. The attack requires no authentication, increasing the attack surface. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the impact could be broad. Compromise of administrative accounts can also lead to supply chain risks if the WordPress site integrates with other internal systems. Additionally, GDPR compliance could be affected if personal data is exposed or mishandled due to this vulnerability.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the WordPress admin dashboard to trusted IP addresses or VPN users to reduce exposure. Administrators should avoid accessing the form submissions page until a patch is available. Implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the file upload metadata fields can provide temporary protection. Monitoring logs for suspicious POST requests to the form submission endpoints is recommended. Plugin developers and site administrators should prioritize releasing and applying patches that properly sanitize and encode all user-supplied metadata before rendering. As a temporary workaround, disabling or removing the vulnerable plugin can eliminate the attack vector. Regular backups and incident response plans should be reviewed to prepare for potential exploitation. Educating administrators about the risk of clicking untrusted links or accessing suspicious admin pages can reduce successful exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-01T21:05:53.563Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69423560364d4dab9cc00c3e

Added to database: 12/17/2025, 4:45:20 AM

Last enriched: 12/24/2025, 5:59:21 AM

Last updated: 2/7/2026, 4:34:05 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats