Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14312: CWE-79 Cross-Site Scripting (XSS) in Advance WP Query Search Filter

0
Medium
VulnerabilityCVE-2025-14312cvecve-2025-14312cwe-79
Published: Tue Dec 30 2025 (12/30/2025, 06:00:03 UTC)
Source: CVE Database V5
Product: Advance WP Query Search Filter

Description

The Advance WP Query Search Filter WordPress plugin through 1.0.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:31:51 UTC

Technical Analysis

CVE-2025-14312 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Advance WP Query Search Filter WordPress plugin, affecting versions up to and including 1.0.10. The vulnerability stems from the plugin's failure to properly sanitize and escape a parameter before outputting it back to the webpage, allowing malicious input to be executed as script code in the victim's browser. This type of XSS is classified under CWE-79. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L) but no availability impact (A:N). Since the plugin is used in WordPress environments, which often include administrative users, attackers can exploit this vulnerability to execute arbitrary JavaScript in the context of high-privilege users, potentially leading to session hijacking, defacement, or further attacks on the backend. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on December 9, 2025, and published on December 30, 2025, with a CVSS 3.1 score of 6.1, indicating medium severity. The plugin's market penetration and usage patterns will influence the risk exposure.

Potential Impact

The primary impact of CVE-2025-14312 is the potential compromise of confidentiality and integrity for organizations using the vulnerable Advance WP Query Search Filter plugin. Attackers can exploit the reflected XSS to execute arbitrary JavaScript in the browsers of users who visit a crafted URL, particularly targeting administrators or other high-privilege users. This can lead to session hijacking, theft of authentication tokens, unauthorized actions performed with elevated privileges, or redirection to malicious sites. Although availability is not directly affected, the indirect consequences such as website defacement or unauthorized administrative changes can disrupt business operations and damage reputation. Organizations with WordPress sites using this plugin are at risk of targeted attacks, especially if they do not have additional security controls like Web Application Firewalls (WAFs) or Content Security Policies (CSPs). The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public. The medium severity rating reflects the moderate impact and ease of exploitation through social engineering (user interaction).

Mitigation Recommendations

To mitigate CVE-2025-14312, organizations should first check if an updated version of the Advance WP Query Search Filter plugin is available that addresses this vulnerability and apply the patch promptly. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing a robust Web Application Firewall (WAF) with rules to detect and block reflected XSS payloads can provide interim protection. Additionally, enforcing strict Content Security Policies (CSP) can help prevent execution of injected scripts. Site administrators should educate users, especially high-privilege users, to avoid clicking suspicious links. Regularly auditing and sanitizing all user inputs in custom code and plugins is recommended to prevent similar vulnerabilities. Monitoring logs for unusual activity and setting up alerts for potential XSS attempts can aid in early detection. Finally, limiting administrative access to trusted networks or using multi-factor authentication (MFA) can reduce the impact of compromised sessions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-09T08:23:14.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a5db813ff03e2be179

Added to database: 12/30/2025, 10:22:29 PM

Last enriched: 4/3/2026, 3:31:51 AM

Last updated: 5/10/2026, 6:39:47 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses