CVE-2025-14725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sablab Internal Link Builder
The Internal Link Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-14725 identifies a stored Cross-Site Scripting (XSS) vulnerability in the sablab Internal Link Builder plugin for WordPress, present in all versions up to and including 1.0. This vulnerability arises from improper input sanitization and insufficient output escaping during web page generation, specifically within the plugin's admin settings interface. An attacker with administrator-level permissions or higher can inject arbitrary JavaScript code that is persistently stored and executed whenever a user accesses the affected page. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to post unfiltered HTML content. The attack vector requires network access (remote), high attack complexity due to the need for elevated privileges, and no user interaction is necessary for exploitation. The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or unauthorized actions performed in the context of the victim user. Availability is not impacted. The CVSS v3.1 base score is 4.4, reflecting medium severity. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability is tracked under CWE-79, indicating improper neutralization of input during web page generation.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of the sablab Internal Link Builder plugin within WordPress multi-site environments or installations with restricted HTML capabilities. Exploitation could allow malicious administrators or compromised admin accounts to inject persistent malicious scripts, potentially leading to session hijacking, data theft, or manipulation of site content. This could undermine user trust, lead to data breaches involving personal or sensitive information, and damage organizational reputation. While the vulnerability requires high privileges, insider threats or compromised admin accounts increase risk. Multi-site installations, common in large enterprises or managed service providers, could see a broader impact due to multiple sites being affected simultaneously. The vulnerability does not affect availability, but the confidentiality and integrity of data and user sessions are at risk. Given the widespread use of WordPress in Europe, especially in sectors like media, education, and government, organizations must assess their exposure carefully.
Mitigation Recommendations
1. Immediately review and restrict administrator-level access to trusted personnel only, minimizing the risk of insider threats. 2. For affected WordPress multi-site installations or those with unfiltered_html disabled, consider disabling or uninstalling the sablab Internal Link Builder plugin until a patch is available. 3. Implement strict input validation and output escaping in custom plugins or themes to prevent similar XSS vulnerabilities. 4. Monitor admin settings pages for unauthorized changes or suspicious script injections. 5. Employ Web Application Firewalls (WAFs) with rules targeting stored XSS payloads to detect and block exploitation attempts. 6. Regularly audit user privileges and enforce multi-factor authentication (MFA) for administrator accounts to reduce the risk of account compromise. 7. Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released. 8. Conduct security awareness training for administrators to recognize and report suspicious activities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2025-14725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sablab Internal Link Builder
Description
The Internal Link Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-14725 identifies a stored Cross-Site Scripting (XSS) vulnerability in the sablab Internal Link Builder plugin for WordPress, present in all versions up to and including 1.0. This vulnerability arises from improper input sanitization and insufficient output escaping during web page generation, specifically within the plugin's admin settings interface. An attacker with administrator-level permissions or higher can inject arbitrary JavaScript code that is persistently stored and executed whenever a user accesses the affected page. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to post unfiltered HTML content. The attack vector requires network access (remote), high attack complexity due to the need for elevated privileges, and no user interaction is necessary for exploitation. The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or unauthorized actions performed in the context of the victim user. Availability is not impacted. The CVSS v3.1 base score is 4.4, reflecting medium severity. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability is tracked under CWE-79, indicating improper neutralization of input during web page generation.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of the sablab Internal Link Builder plugin within WordPress multi-site environments or installations with restricted HTML capabilities. Exploitation could allow malicious administrators or compromised admin accounts to inject persistent malicious scripts, potentially leading to session hijacking, data theft, or manipulation of site content. This could undermine user trust, lead to data breaches involving personal or sensitive information, and damage organizational reputation. While the vulnerability requires high privileges, insider threats or compromised admin accounts increase risk. Multi-site installations, common in large enterprises or managed service providers, could see a broader impact due to multiple sites being affected simultaneously. The vulnerability does not affect availability, but the confidentiality and integrity of data and user sessions are at risk. Given the widespread use of WordPress in Europe, especially in sectors like media, education, and government, organizations must assess their exposure carefully.
Mitigation Recommendations
1. Immediately review and restrict administrator-level access to trusted personnel only, minimizing the risk of insider threats. 2. For affected WordPress multi-site installations or those with unfiltered_html disabled, consider disabling or uninstalling the sablab Internal Link Builder plugin until a patch is available. 3. Implement strict input validation and output escaping in custom plugins or themes to prevent similar XSS vulnerabilities. 4. Monitor admin settings pages for unauthorized changes or suspicious script injections. 5. Employ Web Application Firewalls (WAFs) with rules targeting stored XSS payloads to detect and block exploitation attempts. 6. Regularly audit user privileges and enforce multi-factor authentication (MFA) for administrator accounts to reduce the risk of account compromise. 7. Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released. 8. Conduct security awareness training for administrators to recognize and report suspicious activities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-15T15:14:37.412Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69672e008330e067168f3fe9
Added to database: 1/14/2026, 5:47:44 AM
Last enriched: 1/14/2026, 6:07:14 AM
Last updated: 1/14/2026, 5:34:14 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-71021: n/a
UnknownCVE-2025-65397: n/a
UnknownCVE-2025-65396: n/a
HighCVE-2026-21889: CWE-284: Improper Access Control in WeblateOrg weblate
LowCVE-2025-37185: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.