CVE-2025-13899: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pntrinh TR Timthumb
CVE-2025-13899 is a stored Cross-Site Scripting (XSS) vulnerability in the pntrinh TR Timthumb WordPress plugin affecting all versions up to 1. 0. 4. It allows authenticated users with Contributor-level access or higher to inject malicious scripts via shortcode attributes, which execute when any user views the compromised page. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation does not require user interaction but does require authenticated access with limited privileges. The CVSS score is 6. 4 (medium severity), reflecting the moderate impact on confidentiality and integrity without affecting availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential account compromise or session hijacking.
AI Analysis
Technical Summary
CVE-2025-13899 identifies a stored Cross-Site Scripting (XSS) vulnerability in the pntrinh TR Timthumb plugin for WordPress, present in all versions up to and including 1.0.4. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of shortcode attributes. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into pages via shortcode attributes. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the affected WordPress site. The vulnerability does not require user interaction beyond visiting the compromised page, and the attacker must have at least Contributor-level access, which is a relatively low privilege level in WordPress. The CVSS 3.1 base score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required. The scope is changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the pntrinh TR Timthumb plugin on WordPress. Successful exploitation can lead to the injection of malicious scripts that compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users. This can damage organizational reputation, lead to data breaches, and potentially facilitate further attacks such as phishing or malware distribution. Since Contributor-level access is sufficient for exploitation, insider threats or compromised accounts with limited privileges could be leveraged. The impact is heightened for organizations relying on WordPress for customer-facing or internal portals, especially those handling personal data under GDPR regulations. The vulnerability does not directly affect availability but compromises confidentiality and integrity, which can have regulatory and operational consequences.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the pntrinh TR Timthumb plugin and verify the version in use. Since no official patch links are provided, administrators should consider the following mitigations: 1) Restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode injection. 2) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute patterns or script injections. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 4) Regularly monitor logs and user activity for unusual shortcode usage or content changes. 5) Consider disabling or replacing the vulnerable plugin with a secure alternative if immediate patching is not available. 6) Educate content contributors on secure content practices and the risks of injecting untrusted code. 7) Stay updated with vendor advisories for any forthcoming patches or security updates.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13899: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pntrinh TR Timthumb
Description
CVE-2025-13899 is a stored Cross-Site Scripting (XSS) vulnerability in the pntrinh TR Timthumb WordPress plugin affecting all versions up to 1. 0. 4. It allows authenticated users with Contributor-level access or higher to inject malicious scripts via shortcode attributes, which execute when any user views the compromised page. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation does not require user interaction but does require authenticated access with limited privileges. The CVSS score is 6. 4 (medium severity), reflecting the moderate impact on confidentiality and integrity without affecting availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential account compromise or session hijacking.
AI-Powered Analysis
Technical Analysis
CVE-2025-13899 identifies a stored Cross-Site Scripting (XSS) vulnerability in the pntrinh TR Timthumb plugin for WordPress, present in all versions up to and including 1.0.4. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of shortcode attributes. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into pages via shortcode attributes. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the affected WordPress site. The vulnerability does not require user interaction beyond visiting the compromised page, and the attacker must have at least Contributor-level access, which is a relatively low privilege level in WordPress. The CVSS 3.1 base score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required. The scope is changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the pntrinh TR Timthumb plugin on WordPress. Successful exploitation can lead to the injection of malicious scripts that compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users. This can damage organizational reputation, lead to data breaches, and potentially facilitate further attacks such as phishing or malware distribution. Since Contributor-level access is sufficient for exploitation, insider threats or compromised accounts with limited privileges could be leveraged. The impact is heightened for organizations relying on WordPress for customer-facing or internal portals, especially those handling personal data under GDPR regulations. The vulnerability does not directly affect availability but compromises confidentiality and integrity, which can have regulatory and operational consequences.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the pntrinh TR Timthumb plugin and verify the version in use. Since no official patch links are provided, administrators should consider the following mitigations: 1) Restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode injection. 2) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute patterns or script injections. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 4) Regularly monitor logs and user activity for unusual shortcode usage or content changes. 5) Consider disabling or replacing the vulnerable plugin with a secure alternative if immediate patching is not available. 6) Educate content contributors on secure content practices and the risks of injecting untrusted code. 7) Stay updated with vendor advisories for any forthcoming patches or security updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T16:14:03.217Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933c72011163305efef427d
Added to database: 12/6/2025, 6:03:12 AM
Last enriched: 12/6/2025, 6:13:54 AM
Last updated: 12/6/2025, 7:09:15 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13748: CWE-639 Authorization Bypass Through User-Controlled Key in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
MediumCVE-2025-13377: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 10web 10Web Booster – Website speed optimization, Cache & Page Speed optimizer
CriticalCVE-2025-13907: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tunilame CSS3 Buttons
MediumCVE-2025-13898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sozan45 Ultra Skype Button
MediumCVE-2025-13896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdiscover Social Feed Gallery Portfolio
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.