CVE-2025-14129: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wasiul99 Like DisLike Voting
The Like DisLike Voting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-14129 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Like DisLike Voting plugin for WordPress, developed by wasiul99. The vulnerability exists due to improper neutralization of input during web page generation, specifically involving the $_SERVER['PHP_SELF'] variable. This variable is used in the plugin without adequate sanitization or output escaping, allowing attackers to inject arbitrary JavaScript code into web pages. Because the vulnerability is reflected, the malicious payload is embedded in a crafted URL that, when clicked by a victim, causes the injected script to execute in the context of the victim's browser session. The attack does not require authentication, making it accessible to unauthenticated threat actors. The CVSS 3.1 base score is 6.1, reflecting medium severity, with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No patches or fixes are currently published, and no known exploits are reported in the wild. The vulnerability can lead to theft of session cookies, defacement, or redirection to malicious sites, impacting user confidentiality and integrity. The scope is significant as it affects all versions up to 1.0.1 of the plugin, which is used in WordPress environments worldwide.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites using the Like DisLike Voting plugin on WordPress. Successful exploitation can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of users, undermining user trust and potentially leading to data breaches. While the vulnerability does not directly affect system availability, the compromise of user data and integrity can have regulatory implications under GDPR, including fines and reputational damage. Organizations with high web traffic and user interaction, such as e-commerce, media, and public sector websites, are particularly vulnerable. The reflected nature of the XSS requires user interaction, which may limit large-scale automated exploitation but still presents a significant risk through phishing or social engineering campaigns. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the vulnerable component, potentially impacting other parts of the web application.
Mitigation Recommendations
1. Monitor for and apply security patches or updates from the plugin developer as soon as they become available. 2. Implement strict input validation and output encoding for all user-controllable inputs, especially those derived from server variables like $_SERVER['PHP_SELF']. 3. Employ a robust Content Security Policy (CSP) to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Use Web Application Firewalls (WAFs) configured to detect and block reflected XSS attack patterns targeting the affected plugin endpoints. 5. Educate users and administrators about the risks of clicking on suspicious links and implement phishing awareness training. 6. Consider disabling or replacing the vulnerable plugin with a more secure alternative if immediate patching is not feasible. 7. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-14129: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wasiul99 Like DisLike Voting
Description
The Like DisLike Voting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-14129 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Like DisLike Voting plugin for WordPress, developed by wasiul99. The vulnerability exists due to improper neutralization of input during web page generation, specifically involving the $_SERVER['PHP_SELF'] variable. This variable is used in the plugin without adequate sanitization or output escaping, allowing attackers to inject arbitrary JavaScript code into web pages. Because the vulnerability is reflected, the malicious payload is embedded in a crafted URL that, when clicked by a victim, causes the injected script to execute in the context of the victim's browser session. The attack does not require authentication, making it accessible to unauthenticated threat actors. The CVSS 3.1 base score is 6.1, reflecting medium severity, with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No patches or fixes are currently published, and no known exploits are reported in the wild. The vulnerability can lead to theft of session cookies, defacement, or redirection to malicious sites, impacting user confidentiality and integrity. The scope is significant as it affects all versions up to 1.0.1 of the plugin, which is used in WordPress environments worldwide.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites using the Like DisLike Voting plugin on WordPress. Successful exploitation can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of users, undermining user trust and potentially leading to data breaches. While the vulnerability does not directly affect system availability, the compromise of user data and integrity can have regulatory implications under GDPR, including fines and reputational damage. Organizations with high web traffic and user interaction, such as e-commerce, media, and public sector websites, are particularly vulnerable. The reflected nature of the XSS requires user interaction, which may limit large-scale automated exploitation but still presents a significant risk through phishing or social engineering campaigns. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the vulnerable component, potentially impacting other parts of the web application.
Mitigation Recommendations
1. Monitor for and apply security patches or updates from the plugin developer as soon as they become available. 2. Implement strict input validation and output encoding for all user-controllable inputs, especially those derived from server variables like $_SERVER['PHP_SELF']. 3. Employ a robust Content Security Policy (CSP) to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Use Web Application Firewalls (WAFs) configured to detect and block reflected XSS attack patterns targeting the affected plugin endpoints. 5. Educate users and administrators about the risks of clicking on suspicious links and implement phishing awareness training. 6. Consider disabling or replacing the vulnerable plugin with a more secure alternative if immediate patching is not feasible. 7. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T17:01:22.711Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9189650da22753edbd95
Added to database: 12/12/2025, 3:52:41 AM
Last enriched: 12/19/2025, 5:04:26 AM
Last updated: 2/4/2026, 10:02:46 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Detecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)
MediumMalicious Script Delivering More Maliciousness, (Wed, Feb 4th)
MediumEclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
MediumMicrosoft Warns Python Infostealers Target macOS via Fake Ads and Installers
MediumCVE-2026-1622: CWE-532 Insertion of Sensitive Information into Log File in neo4j Enterprise Edition
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.