Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14076: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in icount iXML – Google XML sitemap generator

0
Medium
VulnerabilityCVE-2025-14076cvecve-2025-14076cwe-79
Published: Thu Feb 19 2026 (02/19/2026, 04:36:16 UTC)
Source: CVE Database V5
Vendor/Project: icount
Product: iXML – Google XML sitemap generator

Description

The iXML – Google XML sitemap generator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'iXML_email' parameter in all versions up to, and including, 0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:29:31 UTC

Technical Analysis

CVE-2025-14076 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the iXML – Google XML sitemap generator plugin for WordPress, affecting all versions up to and including 0.6. The vulnerability stems from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'iXML_email' parameter. This flaw allows unauthenticated attackers to craft malicious URLs containing JavaScript payloads that, when clicked by a victim, execute in the context of the vulnerable website. The attack vector is network-based with no privileges required, but it necessitates user interaction (clicking a malicious link). The vulnerability impacts confidentiality and integrity by enabling theft of session cookies, defacement, or redirection to malicious sites, although it does not affect availability. The CVSS 3.1 score of 6.1 reflects a medium severity level, indicating a moderate risk. No patches are currently linked, and no known exploits have been reported in the wild. The plugin’s role in generating XML sitemaps for SEO purposes means it is commonly deployed on WordPress sites, often public-facing, increasing exposure. The vulnerability’s scope is limited to sites using this specific plugin, but given WordPress’s popularity, the affected population is non-trivial. The reflected XSS nature means attacks rely on social engineering to induce user clicks. The CWE-79 classification confirms the root cause as improper input validation and output encoding during page generation.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized script execution in users’ browsers, potentially resulting in session hijacking, credential theft, phishing, or unauthorized actions performed on behalf of users. Public-facing websites using the vulnerable plugin are at risk of reputational damage and loss of user trust if exploited. Confidential data accessible through the web session could be compromised, and attackers might use the vulnerability as a foothold for further attacks such as delivering malware or redirecting users to malicious sites. Although the vulnerability does not directly impact availability, the indirect consequences such as defacement or data leakage can have significant operational and compliance repercussions, especially under GDPR regulations. Organizations in sectors with high web traffic, including e-commerce, government, and media, are particularly vulnerable. The lack of authentication requirement increases the attack surface, but the need for user interaction somewhat limits automated exploitation. Nonetheless, targeted phishing campaigns exploiting this vulnerability could be effective. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread abuse occurs.

Mitigation Recommendations

1. Monitor for official patches or updates from the plugin vendor and apply them promptly once available. 2. If no patch is currently available, consider disabling or uninstalling the iXML – Google XML sitemap generator plugin to eliminate exposure. 3. Replace the vulnerable plugin with alternative, well-maintained sitemap generator plugins that follow secure coding practices. 4. Deploy Web Application Firewalls (WAFs) with rules specifically designed to detect and block reflected XSS attempts targeting the 'iXML_email' parameter or similar vectors. 5. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on web pages. 6. Conduct user awareness training to reduce the likelihood of users clicking on suspicious or unsolicited links. 7. Regularly scan WordPress sites for outdated or vulnerable plugins using automated vulnerability management tools. 8. Employ input validation and output encoding best practices in custom code to prevent similar vulnerabilities. 9. Monitor web logs for unusual URL parameters or repeated attempts to exploit the 'iXML_email' parameter. 10. Coordinate with incident response teams to prepare for potential exploitation scenarios and ensure rapid containment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T22:21:32.600Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f36aea4a407a3be059

Added to database: 2/19/2026, 4:56:19 AM

Last enriched: 2/19/2026, 5:29:31 AM

Last updated: 2/21/2026, 12:21:32 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats