Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14121: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in samikeijonen EDD Download Info

0
Medium
VulnerabilityCVE-2025-14121cvecve-2025-14121cwe-79
Published: Wed Jan 07 2026 (01/07/2026, 09:21:03 UTC)
Source: CVE Database V5
Vendor/Project: samikeijonen
Product: EDD Download Info

Description

CVE-2025-14121 is a stored Cross-Site Scripting (XSS) vulnerability in the EDD Download Info WordPress plugin up to version 1. 1. It allows authenticated users with contributor-level access or higher to inject malicious scripts via the 'edd_download_info_link' shortcode due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the affected page, potentially compromising user sessions and data. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with contributors who can add or edit content. Mitigation involves restricting contributor privileges, applying patches when available, and implementing additional input validation and output encoding. Countries with high WordPress usage and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/14/2026, 16:03:11 UTC

Technical Analysis

CVE-2025-14121 is a stored Cross-Site Scripting (XSS) vulnerability identified in the EDD Download Info plugin for WordPress, affecting all versions up to and including 1.1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of user-supplied attributes in the 'edd_download_info_link' shortcode. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts that utilize this shortcode. Because the malicious script is stored persistently, it executes in the browsers of any users who view the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change (S:C). The impact affects confidentiality and integrity but not availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites that allow contributors to add or edit content and use this plugin to display download information, often in e-commerce or digital distribution contexts.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of user data on WordPress sites using the EDD Download Info plugin. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of users. This can damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR. E-commerce sites and digital content distributors are especially vulnerable, as attackers could manipulate download links or user interactions. The medium severity score reflects the need for authenticated access, limiting the attack surface to insiders or compromised accounts, but the scope change indicates that the vulnerability can affect multiple users beyond the attacker. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Immediately restrict contributor-level privileges to trusted users only and review existing contributor accounts for suspicious activity. 2. Monitor and audit content changes involving the 'edd_download_info_link' shortcode to detect unauthorized script injections. 3. Implement additional input validation and output encoding at the application or web server level to sanitize user-supplied attributes before rendering. 4. Employ Web Application Firewalls (WAFs) with rules targeting common XSS payloads to block malicious requests. 5. Regularly update the EDD Download Info plugin and WordPress core to the latest versions once patches addressing this vulnerability are released. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict content policies. 7. Consider disabling or replacing the vulnerable plugin with alternatives that follow secure coding practices if immediate patching is not possible. 8. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T16:24:30.793Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c137349d0379d7d57ae

Added to database: 1/7/2026, 12:05:39 PM

Last enriched: 1/14/2026, 4:03:11 PM

Last updated: 2/7/2026, 10:46:00 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats