CVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
The "Amazon affiliate lite Plugin" plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-14735 is a stored Cross-Site Scripting (XSS) vulnerability identified in the nestornoe Amazon affiliate lite plugin for WordPress, affecting all versions up to and including 1.0.0. The vulnerability arises due to improper neutralization of script-related HTML tags (CWE-80) in the plugin's admin settings interface, allowing authenticated administrators to inject arbitrary JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the infected page, potentially compromising user sessions or enabling further attacks such as privilege escalation or data exfiltration. The vulnerability specifically impacts multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope but still significant in complex WordPress environments. The CVSS 3.1 base score is 4.4, indicating medium severity, with attack vector network-based, requiring high attack complexity and administrator privileges, no user interaction, and a scope change. Confidentiality and integrity impacts are low but present, while availability is unaffected. No public exploits have been reported, and no patches are currently available, increasing the importance of mitigation through configuration and access control. The vulnerability was published on December 20, 2025, and assigned by Wordfence. Given the plugin’s role in affiliate marketing, exploitation could lead to unauthorized script execution affecting site visitors and administrators alike.
Potential Impact
For European organizations, especially those operating WordPress multi-site environments with the Amazon affiliate lite plugin installed, this vulnerability poses a risk of unauthorized script execution that can compromise the confidentiality and integrity of data. Attackers with administrator privileges could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, theft of sensitive information, unauthorized actions on behalf of users, or defacement of web content. Although the vulnerability requires high privileges, insider threats or compromised admin accounts could be leveraged to exploit it. The impact is particularly relevant for e-commerce and affiliate marketing sites that rely on this plugin, as exploitation could damage brand reputation, lead to financial losses, and violate data protection regulations such as GDPR if personal data is exposed. The multi-site limitation means larger organizations or hosting providers managing multiple WordPress sites are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor admin activities and audit logs for unusual changes in plugin settings or unexpected script injections. 3. Disable or limit the use of the Amazon affiliate lite plugin in multi-site WordPress environments until a patch is available. 4. If possible, enable the unfiltered_html capability cautiously or review its configuration to reduce exposure. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections targeting the plugin’s admin pages. 6. Regularly update WordPress core and plugins, and subscribe to vendor advisories for timely patch releases. 7. Conduct security awareness training for administrators to recognize and prevent misuse of admin privileges. 8. Consider isolating critical WordPress sites or using containerization to limit lateral movement in case of compromise. 9. Implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected sites. 10. Prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
Description
The "Amazon affiliate lite Plugin" plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-14735 is a stored Cross-Site Scripting (XSS) vulnerability identified in the nestornoe Amazon affiliate lite plugin for WordPress, affecting all versions up to and including 1.0.0. The vulnerability arises due to improper neutralization of script-related HTML tags (CWE-80) in the plugin's admin settings interface, allowing authenticated administrators to inject arbitrary JavaScript code. This malicious code is stored persistently and executed whenever any user accesses the infected page, potentially compromising user sessions or enabling further attacks such as privilege escalation or data exfiltration. The vulnerability specifically impacts multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope but still significant in complex WordPress environments. The CVSS 3.1 base score is 4.4, indicating medium severity, with attack vector network-based, requiring high attack complexity and administrator privileges, no user interaction, and a scope change. Confidentiality and integrity impacts are low but present, while availability is unaffected. No public exploits have been reported, and no patches are currently available, increasing the importance of mitigation through configuration and access control. The vulnerability was published on December 20, 2025, and assigned by Wordfence. Given the plugin’s role in affiliate marketing, exploitation could lead to unauthorized script execution affecting site visitors and administrators alike.
Potential Impact
For European organizations, especially those operating WordPress multi-site environments with the Amazon affiliate lite plugin installed, this vulnerability poses a risk of unauthorized script execution that can compromise the confidentiality and integrity of data. Attackers with administrator privileges could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, theft of sensitive information, unauthorized actions on behalf of users, or defacement of web content. Although the vulnerability requires high privileges, insider threats or compromised admin accounts could be leveraged to exploit it. The impact is particularly relevant for e-commerce and affiliate marketing sites that rely on this plugin, as exploitation could damage brand reputation, lead to financial losses, and violate data protection regulations such as GDPR if personal data is exposed. The multi-site limitation means larger organizations or hosting providers managing multiple WordPress sites are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor admin activities and audit logs for unusual changes in plugin settings or unexpected script injections. 3. Disable or limit the use of the Amazon affiliate lite plugin in multi-site WordPress environments until a patch is available. 4. If possible, enable the unfiltered_html capability cautiously or review its configuration to reduce exposure. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections targeting the plugin’s admin pages. 6. Regularly update WordPress core and plugins, and subscribe to vendor advisories for timely patch releases. 7. Conduct security awareness training for administrators to recognize and prevent misuse of admin privileges. 8. Consider isolating critical WordPress sites or using containerization to limit lateral movement in case of compromise. 9. Implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected sites. 10. Prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-15T18:25:04.862Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694619d3c376abdb7ecb8fae
Added to database: 12/20/2025, 3:36:51 AM
Last enriched: 12/27/2025, 4:27:39 AM
Last updated: 2/4/2026, 10:48:45 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighCVE-2026-1894: Improper Authorization in WeKan
MediumCVE-2025-62616: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2025-62615: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2026-25585: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.