Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13899: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pntrinh TR Timthumb

0
Medium
VulnerabilityCVE-2025-13899cvecve-2025-13899cwe-79
Published: Sat Dec 06 2025 (12/06/2025, 05:49:28 UTC)
Source: CVE Database V5
Vendor/Project: pntrinh
Product: TR Timthumb

Description

CVE-2025-13899 is a stored Cross-Site Scripting (XSS) vulnerability in the pntrinh TR Timthumb WordPress plugin affecting all versions up to 1. 0. 4. It allows authenticated users with Contributor-level access or higher to inject malicious scripts via shortcode attributes, which execute when any user views the compromised page. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation does not require user interaction but does require authenticated access with limited privileges. The CVSS score is 6. 4 (medium severity), reflecting the moderate impact on confidentiality and integrity without affecting availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential account compromise or session hijacking.

AI-Powered Analysis

AILast updated: 12/06/2025, 06:13:54 UTC

Technical Analysis

CVE-2025-13899 identifies a stored Cross-Site Scripting (XSS) vulnerability in the pntrinh TR Timthumb plugin for WordPress, present in all versions up to and including 1.0.4. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of shortcode attributes. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into pages via shortcode attributes. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the affected WordPress site. The vulnerability does not require user interaction beyond visiting the compromised page, and the attacker must have at least Contributor-level access, which is a relatively low privilege level in WordPress. The CVSS 3.1 base score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required. The scope is changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS attacks.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the pntrinh TR Timthumb plugin on WordPress. Successful exploitation can lead to the injection of malicious scripts that compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users. This can damage organizational reputation, lead to data breaches, and potentially facilitate further attacks such as phishing or malware distribution. Since Contributor-level access is sufficient for exploitation, insider threats or compromised accounts with limited privileges could be leveraged. The impact is heightened for organizations relying on WordPress for customer-facing or internal portals, especially those handling personal data under GDPR regulations. The vulnerability does not directly affect availability but compromises confidentiality and integrity, which can have regulatory and operational consequences.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the pntrinh TR Timthumb plugin and verify the version in use. Since no official patch links are provided, administrators should consider the following mitigations: 1) Restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode injection. 2) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute patterns or script injections. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 4) Regularly monitor logs and user activity for unusual shortcode usage or content changes. 5) Consider disabling or replacing the vulnerable plugin with a secure alternative if immediate patching is not available. 6) Educate content contributors on secure content practices and the risks of injecting untrusted code. 7) Stay updated with vendor advisories for any forthcoming patches or security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-02T16:14:03.217Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6933c72011163305efef427d

Added to database: 12/6/2025, 6:03:12 AM

Last enriched: 12/6/2025, 6:13:54 AM

Last updated: 12/6/2025, 7:09:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats