Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sablab Internal Link Builder

0
Medium
VulnerabilityCVE-2025-14725cvecve-2025-14725cwe-79
Published: Wed Jan 14 2026 (01/14/2026, 05:28:05 UTC)
Source: CVE Database V5
Vendor/Project: sablab
Product: Internal Link Builder

Description

The Internal Link Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 01/14/2026, 06:07:14 UTC

Technical Analysis

CVE-2025-14725 identifies a stored Cross-Site Scripting (XSS) vulnerability in the sablab Internal Link Builder plugin for WordPress, present in all versions up to and including 1.0. This vulnerability arises from improper input sanitization and insufficient output escaping during web page generation, specifically within the plugin's admin settings interface. An attacker with administrator-level permissions or higher can inject arbitrary JavaScript code that is persistently stored and executed whenever a user accesses the affected page. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to post unfiltered HTML content. The attack vector requires network access (remote), high attack complexity due to the need for elevated privileges, and no user interaction is necessary for exploitation. The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or unauthorized actions performed in the context of the victim user. Availability is not impacted. The CVSS v3.1 base score is 4.4, reflecting medium severity. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability is tracked under CWE-79, indicating improper neutralization of input during web page generation.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment of the sablab Internal Link Builder plugin within WordPress multi-site environments or installations with restricted HTML capabilities. Exploitation could allow malicious administrators or compromised admin accounts to inject persistent malicious scripts, potentially leading to session hijacking, data theft, or manipulation of site content. This could undermine user trust, lead to data breaches involving personal or sensitive information, and damage organizational reputation. While the vulnerability requires high privileges, insider threats or compromised admin accounts increase risk. Multi-site installations, common in large enterprises or managed service providers, could see a broader impact due to multiple sites being affected simultaneously. The vulnerability does not affect availability, but the confidentiality and integrity of data and user sessions are at risk. Given the widespread use of WordPress in Europe, especially in sectors like media, education, and government, organizations must assess their exposure carefully.

Mitigation Recommendations

1. Immediately review and restrict administrator-level access to trusted personnel only, minimizing the risk of insider threats. 2. For affected WordPress multi-site installations or those with unfiltered_html disabled, consider disabling or uninstalling the sablab Internal Link Builder plugin until a patch is available. 3. Implement strict input validation and output escaping in custom plugins or themes to prevent similar XSS vulnerabilities. 4. Monitor admin settings pages for unauthorized changes or suspicious script injections. 5. Employ Web Application Firewalls (WAFs) with rules targeting stored XSS payloads to detect and block exploitation attempts. 6. Regularly audit user privileges and enforce multi-factor authentication (MFA) for administrator accounts to reduce the risk of account compromise. 7. Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released. 8. Conduct security awareness training for administrators to recognize and report suspicious activities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-15T15:14:37.412Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e008330e067168f3fe9

Added to database: 1/14/2026, 5:47:44 AM

Last enriched: 1/14/2026, 6:07:14 AM

Last updated: 1/14/2026, 5:34:14 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats