Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14721: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mansoormunib RESPONSIVE AND SWIPE SLIDER!

0
Medium
VulnerabilityCVE-2025-14721cvecve-2025-14721cwe-79
Published: Sat Dec 20 2025 (12/20/2025, 03:20:22 UTC)
Source: CVE Database V5
Vendor/Project: mansoormunib
Product: RESPONSIVE AND SWIPE SLIDER!

Description

The Responsive and Swipe slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's rsSlider shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 12/27/2025, 04:24:19 UTC

Technical Analysis

CVE-2025-14721 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Responsive and Swipe Slider WordPress plugin developed by mansoormunib. The flaw exists in all versions up to and including 1.0.2, where the plugin fails to properly sanitize and escape user-supplied attributes passed through its rsSlider shortcode. This improper neutralization of input (CWE-79) allows an authenticated attacker with contributor-level privileges or higher to inject arbitrary JavaScript code into pages or posts. Because the injected scripts are stored persistently in the WordPress database, they execute in the context of any user who views the compromised page, potentially exposing session tokens, cookies, or enabling further malicious actions such as privilege escalation or defacement. The vulnerability requires authentication but no user interaction beyond viewing the page. The CVSS v3.1 base score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and partial confidentiality and integrity impact. No official patches or updates have been published yet, and no known exploits are reported in the wild. The vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those that allow shortcode attributes to be user-controlled. Organizations relying on this plugin should monitor for updates and consider immediate mitigations.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the Responsive and Swipe Slider plugin on WordPress. Exploitation could lead to unauthorized script execution in users' browsers, resulting in session hijacking, defacement, or distribution of malware. This can damage organizational reputation, lead to data leakage, and potentially facilitate further attacks within the network if administrative accounts are compromised. Since contributor-level access is required, the threat is heightened in environments with multiple content editors or where account credentials may be weak or reused. The impact is particularly significant for organizations with public-facing websites that handle sensitive user data or provide critical services. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting user data, and exploitation of this vulnerability could lead to compliance violations and financial penalties. The absence of known exploits reduces immediate risk but should not lead to complacency.

Mitigation Recommendations

1. Immediately restrict contributor-level access to trusted personnel only and review existing user privileges to minimize potential attackers. 2. Monitor WordPress sites for unusual shortcode usage or unexpected script injections in page content. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute patterns or script tags. 4. Disable or remove the Responsive and Swipe Slider plugin if it is not essential until a patched version is released. 5. Encourage plugin developers or community to release a security update that properly sanitizes and escapes all user inputs in the rsSlider shortcode. 6. Educate content editors about the risks of inserting untrusted content and enforce strong authentication mechanisms (e.g., MFA) for all WordPress accounts. 7. Regularly back up website data to enable quick restoration if compromise occurs. 8. Conduct security audits and vulnerability scans focusing on WordPress plugins and shortcode usage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-15T14:27:14.928Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694619d2c376abdb7ecb86cb

Added to database: 12/20/2025, 3:36:50 AM

Last enriched: 12/27/2025, 4:24:19 AM

Last updated: 2/5/2026, 5:36:16 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats