Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14313: CWE-79 Cross-Site Scripting (XSS) in Advance WP Query Search Filter

0
Medium
VulnerabilityCVE-2025-14313cvecve-2025-14313cwe-79
Published: Tue Dec 30 2025 (12/30/2025, 06:00:04 UTC)
Source: CVE Database V5
Product: Advance WP Query Search Filter

Description

The Advance WP Query Search Filter WordPress plugin through 1.0.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

AI-Powered Analysis

AILast updated: 12/30/2025, 22:37:15 UTC

Technical Analysis

CVE-2025-14313 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the Advance WP Query Search Filter WordPress plugin, affecting versions up to 1.0.10. The vulnerability stems from the plugin's failure to sanitize and escape a parameter before outputting it back to the webpage, allowing attackers to inject malicious JavaScript code. When a victim, particularly a high-privilege user such as an administrator, visits a crafted URL containing the malicious payload, the script executes in their browser context. This can lead to theft of authentication cookies, session tokens, or other sensitive information, enabling account takeover or unauthorized actions within the WordPress admin interface. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction (clicking a malicious link). The CVSS 3.1 base score of 6.1 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-79, a common web application security weakness related to improper output encoding and input validation. Given the widespread use of WordPress and the popularity of search filter plugins, this vulnerability could be leveraged in targeted phishing campaigns or automated attacks against vulnerable sites.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of WordPress administrative accounts. Successful exploitation could allow attackers to hijack admin sessions, modify site content, inject malicious code, or pivot to further internal network compromise. Organizations relying on WordPress for critical business functions, e-commerce, or public-facing government services could face reputational damage, data breaches, or service disruptions. The lack of impact on availability reduces the risk of denial-of-service but does not diminish the potential for unauthorized access or data leakage. Since the vulnerability requires user interaction, the risk is heightened in environments where users may be targeted via phishing or social engineering. European data protection regulations such as GDPR also increase the importance of mitigating such vulnerabilities to avoid regulatory penalties related to data breaches. The absence of known exploits in the wild suggests a window of opportunity for proactive remediation before widespread exploitation occurs.

Mitigation Recommendations

European organizations should immediately identify if they use the Advance WP Query Search Filter plugin and verify the version in use. If the plugin is installed and unpatched, organizations should consider the following specific mitigations: 1) Disable or remove the vulnerable plugin until a security patch is released. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns that resemble XSS payloads targeting the vulnerable parameter. 3) Educate users, especially administrators, about phishing risks and the dangers of clicking unknown or suspicious links. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 5) Monitor web server and application logs for unusual request patterns or error messages related to the plugin. 6) Regularly update WordPress core, plugins, and themes to the latest versions once a patch becomes available. 7) Conduct security testing and code review of custom plugins or themes that interact with user input to ensure proper sanitization and escaping. These targeted actions go beyond generic advice by focusing on the specific plugin and attack vector involved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-09T08:23:20.853Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450a5db813ff03e2be17c

Added to database: 12/30/2025, 10:22:29 PM

Last enriched: 12/30/2025, 10:37:15 PM

Last updated: 2/3/2026, 7:04:58 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats