Skip to main content

CVE-2025-1454: CWE-79 Cross-Site Scripting (XSS) in Ninja Pages

Medium
VulnerabilityCVE-2025-1454cvecve-2025-1454cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:26 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Ninja Pages

Description

The Ninja Pages WordPress plugin through 1.4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/11/2025, 21:32:44 UTC

Technical Analysis

CVE-2025-1454 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Ninja Pages WordPress plugin versions through 1.4.2. The root cause is the plugin's failure to properly sanitize and escape certain settings inputs, allowing high-privilege users, such as administrators, to inject malicious scripts. This vulnerability is notable because it can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to add raw HTML or scripts. The attack vector requires the attacker to have at least privileged user access (PR:L) and some user interaction (UI:R), but it can lead to a scope change (S:C) where the impact extends beyond the initially compromised user context. The CVSS 3.1 base score is 5.4, reflecting a medium severity level with network attack vector (AV:N), low attack complexity (AC:L), and limited confidentiality and integrity impact (C:L/I:L) but no availability impact (A:N). Stored XSS vulnerabilities allow malicious scripts to be permanently stored on the target system, which can then execute in the browsers of other users or administrators, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site and its users. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a widely used content management plugin poses a tangible risk, especially in environments where multiple users have administrative privileges or where multisite configurations are used.

Potential Impact

For European organizations using WordPress with the Ninja Pages plugin, this vulnerability could lead to unauthorized script execution within the administrative context, risking the confidentiality and integrity of site data and user credentials. The exploitation could enable attackers to perform actions on behalf of administrators, such as modifying site content, injecting malicious payloads, or stealing sensitive information. In multisite setups common in enterprise or educational institutions, the risk is amplified because the vulnerability bypasses typical restrictions on unfiltered HTML, potentially affecting multiple sites within a network. This could result in reputational damage, data breaches involving personal data protected under GDPR, and operational disruptions. Given the medium severity and the need for privileged access, the threat is more relevant to organizations with multiple administrators or less stringent internal access controls. The lack of availability impact reduces the risk of denial-of-service, but the integrity and confidentiality risks remain significant, especially in sectors handling sensitive or regulated data.

Mitigation Recommendations

European organizations should immediately verify if they use the Ninja Pages plugin up to version 1.4.2 and plan to update to a patched version once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and review user roles to minimize the number of high-privilege accounts. Implementing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections in plugin settings can provide interim protection. Additionally, organizations should audit multisite configurations to ensure that unfiltered_html capabilities are appropriately managed and consider disabling or limiting the Ninja Pages plugin if it is not essential. Regular security training for administrators on the risks of stored XSS and safe handling of plugin settings is recommended. Monitoring logs for unusual administrative activity and employing Content Security Policy (CSP) headers can help mitigate the impact of any successful exploitation by restricting script execution contexts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-02-18T18:11:25.188Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba95

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 9:32:44 PM

Last updated: 8/16/2025, 1:03:50 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats