CVE-2025-14121: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in samikeijonen EDD Download Info
CVE-2025-14121 is a stored Cross-Site Scripting (XSS) vulnerability in the EDD Download Info WordPress plugin up to version 1. 1. It allows authenticated users with contributor-level access or higher to inject malicious scripts via the 'edd_download_info_link' shortcode due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the affected page, potentially compromising user sessions and data. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with contributors who can add or edit content. Mitigation involves restricting contributor privileges, applying patches when available, and implementing additional input validation and output encoding. Countries with high WordPress usage and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-14121 is a stored Cross-Site Scripting (XSS) vulnerability identified in the EDD Download Info plugin for WordPress, affecting all versions up to and including 1.1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of user-supplied attributes in the 'edd_download_info_link' shortcode. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts that utilize this shortcode. Because the malicious script is stored persistently, it executes in the browsers of any users who view the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change (S:C). The impact affects confidentiality and integrity but not availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites that allow contributors to add or edit content and use this plugin to display download information, often in e-commerce or digital distribution contexts.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of user data on WordPress sites using the EDD Download Info plugin. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of users. This can damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR. E-commerce sites and digital content distributors are especially vulnerable, as attackers could manipulate download links or user interactions. The medium severity score reflects the need for authenticated access, limiting the attack surface to insiders or compromised accounts, but the scope change indicates that the vulnerability can affect multiple users beyond the attacker. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Immediately restrict contributor-level privileges to trusted users only and review existing contributor accounts for suspicious activity. 2. Monitor and audit content changes involving the 'edd_download_info_link' shortcode to detect unauthorized script injections. 3. Implement additional input validation and output encoding at the application or web server level to sanitize user-supplied attributes before rendering. 4. Employ Web Application Firewalls (WAFs) with rules targeting common XSS payloads to block malicious requests. 5. Regularly update the EDD Download Info plugin and WordPress core to the latest versions once patches addressing this vulnerability are released. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict content policies. 7. Consider disabling or replacing the vulnerable plugin with alternatives that follow secure coding practices if immediate patching is not possible. 8. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-14121: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in samikeijonen EDD Download Info
Description
CVE-2025-14121 is a stored Cross-Site Scripting (XSS) vulnerability in the EDD Download Info WordPress plugin up to version 1. 1. It allows authenticated users with contributor-level access or higher to inject malicious scripts via the 'edd_download_info_link' shortcode due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the affected page, potentially compromising user sessions and data. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with contributors who can add or edit content. Mitigation involves restricting contributor privileges, applying patches when available, and implementing additional input validation and output encoding. Countries with high WordPress usage and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-14121 is a stored Cross-Site Scripting (XSS) vulnerability identified in the EDD Download Info plugin for WordPress, affecting all versions up to and including 1.1. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of user-supplied attributes in the 'edd_download_info_link' shortcode. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts that utilize this shortcode. Because the malicious script is stored persistently, it executes in the browsers of any users who view the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change (S:C). The impact affects confidentiality and integrity but not availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites that allow contributors to add or edit content and use this plugin to display download information, often in e-commerce or digital distribution contexts.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of user data on WordPress sites using the EDD Download Info plugin. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of users. This can damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR. E-commerce sites and digital content distributors are especially vulnerable, as attackers could manipulate download links or user interactions. The medium severity score reflects the need for authenticated access, limiting the attack surface to insiders or compromised accounts, but the scope change indicates that the vulnerability can affect multiple users beyond the attacker. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Immediately restrict contributor-level privileges to trusted users only and review existing contributor accounts for suspicious activity. 2. Monitor and audit content changes involving the 'edd_download_info_link' shortcode to detect unauthorized script injections. 3. Implement additional input validation and output encoding at the application or web server level to sanitize user-supplied attributes before rendering. 4. Employ Web Application Firewalls (WAFs) with rules targeting common XSS payloads to block malicious requests. 5. Regularly update the EDD Download Info plugin and WordPress core to the latest versions once patches addressing this vulnerability are released. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict content policies. 7. Consider disabling or replacing the vulnerable plugin with alternatives that follow secure coding practices if immediate patching is not possible. 8. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T16:24:30.793Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c137349d0379d7d57ae
Added to database: 1/7/2026, 12:05:39 PM
Last enriched: 1/14/2026, 4:03:11 PM
Last updated: 2/7/2026, 10:46:00 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.