Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14147: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in corsonr Easy GitHub Gist Shortcodes

0
Medium
VulnerabilityCVE-2025-14147cvecve-2025-14147cwe-79
Published: Wed Jan 07 2026 (01/07/2026, 09:21:03 UTC)
Source: CVE Database V5
Vendor/Project: corsonr
Product: Easy GitHub Gist Shortcodes

Description

CVE-2025-14147 is a stored Cross-Site Scripting (XSS) vulnerability in the Easy GitHub Gist Shortcodes WordPress plugin, affecting all versions up to 1. 0. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting malicious scripts via the 'id' parameter of the gist shortcode. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, data theft, or further attacks. The vulnerability arises from improper input sanitization and output escaping, classified under CWE-79. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low complexity and no user interaction required. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to websites using this plugin, especially those with multiple contributors. European organizations using WordPress sites with this plugin should prioritize patching or mitigating this issue to prevent potential compromise. Countries with high WordPress adoption and active web development communities, such as Germany, the UK, France, and the Netherlands, are more likely to be affected.

AI-Powered Analysis

AILast updated: 01/14/2026, 16:03:27 UTC

Technical Analysis

CVE-2025-14147 identifies a stored Cross-Site Scripting vulnerability in the Easy GitHub Gist Shortcodes plugin for WordPress, affecting all versions up to and including 1.0. This vulnerability stems from improper neutralization of input during web page generation, specifically inadequate sanitization and escaping of the 'id' parameter within the gist shortcode. Authenticated users with Contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages that utilize the shortcode. Because the malicious script is stored, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of the victim. The vulnerability is classified under CWE-79, indicating a failure to properly sanitize inputs before outputting them in a web context. The CVSS v3.1 base score is 6.4, reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the contributor level, but does not require user interaction. The scope is changed, meaning the vulnerability can affect components beyond the initially vulnerable plugin, such as user sessions or other site content. No known public exploits have been reported yet, but the presence of multiple contributors on WordPress sites using this plugin increases the risk of exploitation. The lack of patch links suggests that a fix is either pending or not yet publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily to WordPress-based websites that utilize the Easy GitHub Gist Shortcodes plugin. Exploitation can lead to unauthorized script execution in the context of site visitors, potentially resulting in session hijacking, defacement, or data theft. Organizations with collaborative content creation workflows involving contributors are particularly vulnerable, as the exploit requires authenticated contributor access. The impact extends to the confidentiality and integrity of user data and site content, though availability is not directly affected. Given the widespread use of WordPress across Europe, especially in sectors like media, education, and small to medium enterprises, the vulnerability could facilitate targeted attacks or broader compromise campaigns. Additionally, compromised sites could be leveraged to distribute malware or conduct phishing attacks, amplifying the threat. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code could be developed rapidly once the vulnerability is publicized.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy. First, restrict Contributor-level permissions to trusted users only, minimizing the risk of malicious shortcode injection. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block XSS payloads, particularly those targeting shortcode parameters. Regularly audit shortcode usage and content submissions for suspicious or unexpected scripts. Until an official patch is released, consider disabling or removing the Easy GitHub Gist Shortcodes plugin if it is not critical to operations. For sites that must continue using the plugin, implement content security policies (CSP) to limit the execution of unauthorized scripts. Additionally, educate content contributors about secure coding practices and the risks of injecting untrusted content. Monitor logs and user activity for signs of exploitation attempts. Once a patch becomes available, prioritize its deployment across all affected systems to fully remediate the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T18:52:55.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c147349d0379d7d57f2

Added to database: 1/7/2026, 12:05:40 PM

Last enriched: 1/14/2026, 4:03:27 PM

Last updated: 2/7/2026, 1:53:54 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats