CVE-2025-13975: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in izuchy Contact Form 7 with ChatWork
The Contact Form 7 with ChatWork plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_token' and 'roomid' settings in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the settings page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-13975 identifies a stored Cross-Site Scripting (XSS) vulnerability in the 'Contact Form 7 with ChatWork' WordPress plugin developed by izuchy. This vulnerability affects all versions up to and including 1.1.0. The root cause is insufficient sanitization and escaping of user-supplied input in the 'api_token' and 'roomid' configuration settings. An attacker with administrator-level privileges can inject arbitrary JavaScript code into these settings. Because the plugin stores these inputs and renders them on the settings page without proper neutralization, the malicious script executes whenever any user with access views the settings page. The vulnerability is limited to multi-site WordPress installations or installations where the 'unfiltered_html' capability is disabled, as these conditions affect how HTML content is filtered and rendered. The CVSS 3.1 vector (AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N) indicates that exploitation requires network access, high attack complexity, and administrator privileges, with no user interaction needed. The scope is changed because the vulnerability affects multiple components or privileges within the WordPress multi-site environment. The impact on confidentiality and integrity is low due to the limited scope of script execution, and availability is unaffected. No public exploits have been reported, but the vulnerability poses a risk of administrative interface compromise, potentially leading to further attacks such as session hijacking or privilege escalation if combined with other vulnerabilities.
Potential Impact
For European organizations, this vulnerability primarily threatens the security of WordPress multi-site environments using the 'Contact Form 7 with ChatWork' plugin. Since exploitation requires administrator privileges, the risk is limited to insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the administrative interface, potentially leading to theft of admin session tokens, unauthorized actions within the WordPress dashboard, or planting of further malicious payloads. This could undermine the integrity of the website management process and lead to defacement, data leakage, or pivoting to other internal systems. Given the widespread use of WordPress in Europe, especially among SMEs and public sector entities, the vulnerability could impact organizations that rely on this plugin for communication integration. The multi-site limitation narrows the affected population but does not eliminate risk for large organizations or hosting providers managing multiple sites. Additionally, organizations with strict content filtering (disabling 'unfiltered_html') are more susceptible. The medium severity rating suggests moderate risk, but the potential for chained attacks elevates the importance of timely remediation.
Mitigation Recommendations
European organizations should immediately verify if they operate multi-site WordPress installations using the 'Contact Form 7 with ChatWork' plugin at versions up to 1.1.0. Since no official patch links are provided, administrators should consider the following mitigations: (1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce the risk of credential compromise. (2) Temporarily disable or uninstall the vulnerable plugin if feasible until a patched version is released. (3) Monitor and audit changes to plugin settings, especially the 'api_token' and 'roomid' fields, for suspicious input patterns indicative of script injection. (4) Implement Web Application Firewall (WAF) rules to detect and block malicious script payloads targeting the plugin's settings page. (5) Educate administrators about the risks of stored XSS and encourage cautious handling of plugin configurations. (6) Review and harden WordPress multi-site configurations, ensuring minimal privileges and proper content filtering settings. (7) Stay alert for vendor updates or security advisories providing patches or official fixes and apply them promptly. These steps go beyond generic advice by focusing on access control, monitoring, and configuration hardening specific to this vulnerability's context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13975: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in izuchy Contact Form 7 with ChatWork
Description
The Contact Form 7 with ChatWork plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_token' and 'roomid' settings in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the settings page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-13975 identifies a stored Cross-Site Scripting (XSS) vulnerability in the 'Contact Form 7 with ChatWork' WordPress plugin developed by izuchy. This vulnerability affects all versions up to and including 1.1.0. The root cause is insufficient sanitization and escaping of user-supplied input in the 'api_token' and 'roomid' configuration settings. An attacker with administrator-level privileges can inject arbitrary JavaScript code into these settings. Because the plugin stores these inputs and renders them on the settings page without proper neutralization, the malicious script executes whenever any user with access views the settings page. The vulnerability is limited to multi-site WordPress installations or installations where the 'unfiltered_html' capability is disabled, as these conditions affect how HTML content is filtered and rendered. The CVSS 3.1 vector (AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N) indicates that exploitation requires network access, high attack complexity, and administrator privileges, with no user interaction needed. The scope is changed because the vulnerability affects multiple components or privileges within the WordPress multi-site environment. The impact on confidentiality and integrity is low due to the limited scope of script execution, and availability is unaffected. No public exploits have been reported, but the vulnerability poses a risk of administrative interface compromise, potentially leading to further attacks such as session hijacking or privilege escalation if combined with other vulnerabilities.
Potential Impact
For European organizations, this vulnerability primarily threatens the security of WordPress multi-site environments using the 'Contact Form 7 with ChatWork' plugin. Since exploitation requires administrator privileges, the risk is limited to insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts in the administrative interface, potentially leading to theft of admin session tokens, unauthorized actions within the WordPress dashboard, or planting of further malicious payloads. This could undermine the integrity of the website management process and lead to defacement, data leakage, or pivoting to other internal systems. Given the widespread use of WordPress in Europe, especially among SMEs and public sector entities, the vulnerability could impact organizations that rely on this plugin for communication integration. The multi-site limitation narrows the affected population but does not eliminate risk for large organizations or hosting providers managing multiple sites. Additionally, organizations with strict content filtering (disabling 'unfiltered_html') are more susceptible. The medium severity rating suggests moderate risk, but the potential for chained attacks elevates the importance of timely remediation.
Mitigation Recommendations
European organizations should immediately verify if they operate multi-site WordPress installations using the 'Contact Form 7 with ChatWork' plugin at versions up to 1.1.0. Since no official patch links are provided, administrators should consider the following mitigations: (1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce the risk of credential compromise. (2) Temporarily disable or uninstall the vulnerable plugin if feasible until a patched version is released. (3) Monitor and audit changes to plugin settings, especially the 'api_token' and 'roomid' fields, for suspicious input patterns indicative of script injection. (4) Implement Web Application Firewall (WAF) rules to detect and block malicious script payloads targeting the plugin's settings page. (5) Educate administrators about the risks of stored XSS and encourage cautious handling of plugin configurations. (6) Review and harden WordPress multi-site configurations, ensuring minimal privileges and proper content filtering settings. (7) Stay alert for vendor updates or security advisories providing patches or official fixes and apply them promptly. These steps go beyond generic advice by focusing on access control, monitoring, and configuration hardening specific to this vulnerability's context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-03T16:35:46.064Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9187650da22753edbd3d
Added to database: 12/12/2025, 3:52:39 AM
Last enriched: 12/12/2025, 4:15:14 AM
Last updated: 12/14/2025, 3:16:36 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14664: SQL Injection in Campcodes Supplier Management System
MediumCVE-2025-14663: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14662: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14660: Improper Access Controls in DecoCMS Mesh
MediumCVE-2025-14661: SQL Injection in itsourcecode Student Managemen System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.