CVE-2025-14745: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rebelcode RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging
CVE-2025-14745 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' by rebelcode, affecting all versions up to 5. 0. 10. Authenticated users with contributor-level access or higher can inject malicious scripts via the plugin's shortcode due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. There are no known exploits in the wild yet, and no official patches have been linked. European organizations using this plugin on WordPress sites are at risk, especially those with contributor-level user roles. Mitigations include restricting contributor access, monitoring for suspicious shortcode usage, and applying custom input validation or output escaping until an official patch is released.
AI Analysis
Technical Summary
CVE-2025-14745 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 found in the WordPress plugin 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' by rebelcode. The vulnerability arises from improper neutralization of user-supplied input within the plugin's 'wp-rss-aggregator' shortcode, which fails to adequately sanitize and escape attributes before rendering them on web pages. This flaw allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code that is persistently stored and executed in the context of any user who views the affected page. The attack vector requires no user interaction beyond page access but does require authenticated access with relatively low privileges, making it a significant risk in multi-user WordPress environments. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required at the contributor level, no user interaction, and partial impact on confidentiality and integrity, with no impact on availability. The vulnerability affects all versions up to and including 5.0.10 of the plugin. Currently, there are no known exploits in the wild and no official patches publicly available, increasing the urgency for organizations to implement interim mitigations. The vulnerability could be exploited to steal session cookies, deface websites, or conduct further attacks such as phishing or privilege escalation within the WordPress environment.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the affected RSS Aggregator plugin installed. Since contributor-level users can exploit this flaw, organizations with multiple content creators or editors are particularly vulnerable. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, potentially violating GDPR requirements. The integrity of web content could be compromised, damaging brand reputation and user trust. Although availability is not directly impacted, the injected scripts could facilitate further attacks that degrade service or lead to broader compromise. Organizations in sectors with high regulatory scrutiny, such as finance, healthcare, and government, may face increased compliance and legal risks if exploited. The lack of known exploits in the wild provides a window for proactive defense, but the widespread use of WordPress and this plugin in Europe means the attack surface is significant.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' plugin and verify the version in use. 2. Restrict contributor-level access to trusted users only and review user roles to minimize the number of users with permissions to inject content via shortcodes. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute patterns that may contain script tags or JavaScript payloads. 4. Employ custom input validation and output escaping for shortcode attributes by modifying plugin code or using WordPress hooks to sanitize inputs until an official patch is released. 5. Monitor logs and website content for unusual changes or injected scripts, especially on pages using the vulnerable shortcode. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content policies. 7. Stay alert for official patches or updates from rebelcode and apply them promptly once available. 8. Consider isolating or sandboxing WordPress instances that use this plugin to limit potential lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-14745: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rebelcode RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging
Description
CVE-2025-14745 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' by rebelcode, affecting all versions up to 5. 0. 10. Authenticated users with contributor-level access or higher can inject malicious scripts via the plugin's shortcode due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. There are no known exploits in the wild yet, and no official patches have been linked. European organizations using this plugin on WordPress sites are at risk, especially those with contributor-level user roles. Mitigations include restricting contributor access, monitoring for suspicious shortcode usage, and applying custom input validation or output escaping until an official patch is released.
AI-Powered Analysis
Technical Analysis
CVE-2025-14745 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 found in the WordPress plugin 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' by rebelcode. The vulnerability arises from improper neutralization of user-supplied input within the plugin's 'wp-rss-aggregator' shortcode, which fails to adequately sanitize and escape attributes before rendering them on web pages. This flaw allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code that is persistently stored and executed in the context of any user who views the affected page. The attack vector requires no user interaction beyond page access but does require authenticated access with relatively low privileges, making it a significant risk in multi-user WordPress environments. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required at the contributor level, no user interaction, and partial impact on confidentiality and integrity, with no impact on availability. The vulnerability affects all versions up to and including 5.0.10 of the plugin. Currently, there are no known exploits in the wild and no official patches publicly available, increasing the urgency for organizations to implement interim mitigations. The vulnerability could be exploited to steal session cookies, deface websites, or conduct further attacks such as phishing or privilege escalation within the WordPress environment.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the affected RSS Aggregator plugin installed. Since contributor-level users can exploit this flaw, organizations with multiple content creators or editors are particularly vulnerable. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, potentially violating GDPR requirements. The integrity of web content could be compromised, damaging brand reputation and user trust. Although availability is not directly impacted, the injected scripts could facilitate further attacks that degrade service or lead to broader compromise. Organizations in sectors with high regulatory scrutiny, such as finance, healthcare, and government, may face increased compliance and legal risks if exploited. The lack of known exploits in the wild provides a window for proactive defense, but the widespread use of WordPress and this plugin in Europe means the attack surface is significant.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the 'RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging' plugin and verify the version in use. 2. Restrict contributor-level access to trusted users only and review user roles to minimize the number of users with permissions to inject content via shortcodes. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute patterns that may contain script tags or JavaScript payloads. 4. Employ custom input validation and output escaping for shortcode attributes by modifying plugin code or using WordPress hooks to sanitize inputs until an official patch is released. 5. Monitor logs and website content for unusual changes or injected scripts, especially on pages using the vulnerable shortcode. 6. Educate content contributors about the risks of injecting untrusted content and enforce strict content policies. 7. Stay alert for official patches or updates from rebelcode and apply them promptly once available. 8. Consider isolating or sandboxing WordPress instances that use this plugin to limit potential lateral movement in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-15T20:32:38.308Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697308bc4623b1157c072633
Added to database: 1/23/2026, 5:35:56 AM
Last enriched: 1/23/2026, 5:50:34 AM
Last updated: 1/23/2026, 9:06:58 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22271: CWE-319: Cleartext Transmission of Sensitive Information in Dell ObjectScale
HighCVE-2026-1364: CWE-306 Missing Authentication for Critical Function in JNC IAQS
CriticalCVE-2026-1363: CWE-603 Use of Client-Side Authentication in JNC IAQS
CriticalCVE-2026-24515: CWE-476 NULL Pointer Dereference in libexpat project libexpat
LowCVE-2026-0603: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.