CVE-2025-1454: CWE-79 Cross-Site Scripting (XSS) in Ninja Pages
The Ninja Pages WordPress plugin through 1.4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2025-1454 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Ninja Pages WordPress plugin versions through 1.4.2. The root cause is the plugin's failure to properly sanitize and escape certain settings inputs, allowing high-privilege users, such as administrators, to inject malicious scripts. This vulnerability is notable because it can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to add raw HTML or scripts. The attack vector requires the attacker to have at least privileged user access (PR:L) and some user interaction (UI:R), but it can lead to a scope change (S:C) where the impact extends beyond the initially compromised user context. The CVSS 3.1 base score is 5.4, reflecting a medium severity level with network attack vector (AV:N), low attack complexity (AC:L), and limited confidentiality and integrity impact (C:L/I:L) but no availability impact (A:N). Stored XSS vulnerabilities allow malicious scripts to be permanently stored on the target system, which can then execute in the browsers of other users or administrators, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site and its users. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a widely used content management plugin poses a tangible risk, especially in environments where multiple users have administrative privileges or where multisite configurations are used.
Potential Impact
For European organizations using WordPress with the Ninja Pages plugin, this vulnerability could lead to unauthorized script execution within the administrative context, risking the confidentiality and integrity of site data and user credentials. The exploitation could enable attackers to perform actions on behalf of administrators, such as modifying site content, injecting malicious payloads, or stealing sensitive information. In multisite setups common in enterprise or educational institutions, the risk is amplified because the vulnerability bypasses typical restrictions on unfiltered HTML, potentially affecting multiple sites within a network. This could result in reputational damage, data breaches involving personal data protected under GDPR, and operational disruptions. Given the medium severity and the need for privileged access, the threat is more relevant to organizations with multiple administrators or less stringent internal access controls. The lack of availability impact reduces the risk of denial-of-service, but the integrity and confidentiality risks remain significant, especially in sectors handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify if they use the Ninja Pages plugin up to version 1.4.2 and plan to update to a patched version once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and review user roles to minimize the number of high-privilege accounts. Implementing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections in plugin settings can provide interim protection. Additionally, organizations should audit multisite configurations to ensure that unfiltered_html capabilities are appropriately managed and consider disabling or limiting the Ninja Pages plugin if it is not essential. Regular security training for administrators on the risks of stored XSS and safe handling of plugin settings is recommended. Monitoring logs for unusual administrative activity and employing Content Security Policy (CSP) headers can help mitigate the impact of any successful exploitation by restricting script execution contexts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-1454: CWE-79 Cross-Site Scripting (XSS) in Ninja Pages
Description
The Ninja Pages WordPress plugin through 1.4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2025-1454 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Ninja Pages WordPress plugin versions through 1.4.2. The root cause is the plugin's failure to properly sanitize and escape certain settings inputs, allowing high-privilege users, such as administrators, to inject malicious scripts. This vulnerability is notable because it can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to add raw HTML or scripts. The attack vector requires the attacker to have at least privileged user access (PR:L) and some user interaction (UI:R), but it can lead to a scope change (S:C) where the impact extends beyond the initially compromised user context. The CVSS 3.1 base score is 5.4, reflecting a medium severity level with network attack vector (AV:N), low attack complexity (AC:L), and limited confidentiality and integrity impact (C:L/I:L) but no availability impact (A:N). Stored XSS vulnerabilities allow malicious scripts to be permanently stored on the target system, which can then execute in the browsers of other users or administrators, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site and its users. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a widely used content management plugin poses a tangible risk, especially in environments where multiple users have administrative privileges or where multisite configurations are used.
Potential Impact
For European organizations using WordPress with the Ninja Pages plugin, this vulnerability could lead to unauthorized script execution within the administrative context, risking the confidentiality and integrity of site data and user credentials. The exploitation could enable attackers to perform actions on behalf of administrators, such as modifying site content, injecting malicious payloads, or stealing sensitive information. In multisite setups common in enterprise or educational institutions, the risk is amplified because the vulnerability bypasses typical restrictions on unfiltered HTML, potentially affecting multiple sites within a network. This could result in reputational damage, data breaches involving personal data protected under GDPR, and operational disruptions. Given the medium severity and the need for privileged access, the threat is more relevant to organizations with multiple administrators or less stringent internal access controls. The lack of availability impact reduces the risk of denial-of-service, but the integrity and confidentiality risks remain significant, especially in sectors handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify if they use the Ninja Pages plugin up to version 1.4.2 and plan to update to a patched version once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and review user roles to minimize the number of high-privilege accounts. Implementing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections in plugin settings can provide interim protection. Additionally, organizations should audit multisite configurations to ensure that unfiltered_html capabilities are appropriately managed and consider disabling or limiting the Ninja Pages plugin if it is not essential. Regular security training for administrators on the risks of stored XSS and safe handling of plugin settings is recommended. Monitoring logs for unusual administrative activity and employing Content Security Policy (CSP) headers can help mitigate the impact of any successful exploitation by restricting script execution contexts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-02-18T18:11:25.188Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeba95
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 9:32:44 PM
Last updated: 8/16/2025, 1:03:50 PM
Views: 16
Related Threats
CVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.