CVE-2025-14053: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jseto Travel Bucket List – Wish To Go
CVE-2025-14053 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Travel Bucket List – Wish To Go' by jseto, affecting all versions up to 0. 5. 2. Authenticated users with Contributor-level access or higher can inject malicious scripts via shortcode attributes due to improper input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. European organizations using this plugin on WordPress sites are at risk, especially those with multiple contributors. Mitigation requires updating the plugin once a patch is available or applying strict input validation and output encoding on shortcode attributes. Countries with high WordPress usage and active tourism or travel sectors may be more targeted.
AI Analysis
Technical Summary
CVE-2025-14053 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the WordPress plugin 'Travel Bucket List – Wish To Go' developed by jseto. This vulnerability affects all versions up to and including 0.5.2. The root cause is insufficient sanitization and escaping of user-supplied shortcode attributes, which allows authenticated users with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages. Because the malicious scripts are stored in the database and rendered whenever the affected page is accessed, any visitor to the page—including administrators and other users—may have the injected script executed in their browsers. This can lead to session hijacking, privilege escalation, defacement, or distribution of malware. The vulnerability requires no user interaction beyond visiting the compromised page but does require the attacker to have authenticated access with at least Contributor permissions, which is a moderate barrier. The CVSS v3.1 score is 6.4, reflecting medium severity with network attack vector, low attack complexity, and partial impact on confidentiality and integrity, but no impact on availability. No public exploits have been reported yet. The vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those that accept user-generated content through shortcodes.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the 'Travel Bucket List – Wish To Go' plugin installed. The impact includes potential compromise of user accounts through session hijacking, unauthorized actions performed on behalf of users, and defacement or manipulation of website content. Organizations in the travel, tourism, and hospitality sectors that use this plugin to showcase travel destinations or bucket lists are particularly at risk, as attackers could exploit the vulnerability to damage reputation or steal sensitive user data. Since the attack requires authenticated access at Contributor level or higher, the risk is elevated in environments with multiple content contributors or less stringent access controls. The vulnerability does not affect system availability but compromises confidentiality and integrity of user sessions and data. Additionally, the stored nature of the XSS means that the malicious payload persists and can affect many users over time, increasing the potential damage. European organizations with public-facing WordPress sites and active user communities should consider this a significant threat vector.
Mitigation Recommendations
1. Immediately review and restrict Contributor-level and higher access to trusted users only, minimizing the risk of malicious shortcode injection. 2. Monitor and audit shortcode attributes and content submitted by contributors for suspicious or unexpected scripts. 3. Apply strict input validation and output encoding on all shortcode attributes, ensuring that any user-supplied data is sanitized before rendering. 4. Disable or remove the 'Travel Bucket List – Wish To Go' plugin if it is not essential, or replace it with a more secure alternative. 5. Stay alert for official patches or updates from the vendor and apply them promptly once available. 6. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 7. Conduct regular security scans and penetration tests focusing on stored XSS vulnerabilities in WordPress plugins. 8. Educate content contributors about the risks of injecting untrusted content and enforce secure content submission policies. 9. Use Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting shortcode attributes. 10. Backup website data regularly to enable quick recovery if an attack occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-14053: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jseto Travel Bucket List – Wish To Go
Description
CVE-2025-14053 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Travel Bucket List – Wish To Go' by jseto, affecting all versions up to 0. 5. 2. Authenticated users with Contributor-level access or higher can inject malicious scripts via shortcode attributes due to improper input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild as of now. European organizations using this plugin on WordPress sites are at risk, especially those with multiple contributors. Mitigation requires updating the plugin once a patch is available or applying strict input validation and output encoding on shortcode attributes. Countries with high WordPress usage and active tourism or travel sectors may be more targeted.
AI-Powered Analysis
Technical Analysis
CVE-2025-14053 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the WordPress plugin 'Travel Bucket List – Wish To Go' developed by jseto. This vulnerability affects all versions up to and including 0.5.2. The root cause is insufficient sanitization and escaping of user-supplied shortcode attributes, which allows authenticated users with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages. Because the malicious scripts are stored in the database and rendered whenever the affected page is accessed, any visitor to the page—including administrators and other users—may have the injected script executed in their browsers. This can lead to session hijacking, privilege escalation, defacement, or distribution of malware. The vulnerability requires no user interaction beyond visiting the compromised page but does require the attacker to have authenticated access with at least Contributor permissions, which is a moderate barrier. The CVSS v3.1 score is 6.4, reflecting medium severity with network attack vector, low attack complexity, and partial impact on confidentiality and integrity, but no impact on availability. No public exploits have been reported yet. The vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those that accept user-generated content through shortcodes.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the 'Travel Bucket List – Wish To Go' plugin installed. The impact includes potential compromise of user accounts through session hijacking, unauthorized actions performed on behalf of users, and defacement or manipulation of website content. Organizations in the travel, tourism, and hospitality sectors that use this plugin to showcase travel destinations or bucket lists are particularly at risk, as attackers could exploit the vulnerability to damage reputation or steal sensitive user data. Since the attack requires authenticated access at Contributor level or higher, the risk is elevated in environments with multiple content contributors or less stringent access controls. The vulnerability does not affect system availability but compromises confidentiality and integrity of user sessions and data. Additionally, the stored nature of the XSS means that the malicious payload persists and can affect many users over time, increasing the potential damage. European organizations with public-facing WordPress sites and active user communities should consider this a significant threat vector.
Mitigation Recommendations
1. Immediately review and restrict Contributor-level and higher access to trusted users only, minimizing the risk of malicious shortcode injection. 2. Monitor and audit shortcode attributes and content submitted by contributors for suspicious or unexpected scripts. 3. Apply strict input validation and output encoding on all shortcode attributes, ensuring that any user-supplied data is sanitized before rendering. 4. Disable or remove the 'Travel Bucket List – Wish To Go' plugin if it is not essential, or replace it with a more secure alternative. 5. Stay alert for official patches or updates from the vendor and apply them promptly once available. 6. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 7. Conduct regular security scans and penetration tests focusing on stored XSS vulnerabilities in WordPress plugins. 8. Educate content contributors about the risks of injecting untrusted content and enforce secure content submission policies. 9. Use Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting shortcode attributes. 10. Backup website data regularly to enable quick recovery if an attack occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T17:45:36.956Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c117349d0379d7d56ab
Added to database: 1/7/2026, 12:05:37 PM
Last enriched: 1/14/2026, 3:43:52 PM
Last updated: 2/7/2026, 12:27:35 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.