Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14792: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in audrasjb Key Figures

0
Medium
VulnerabilityCVE-2025-14792cvecve-2025-14792cwe-80
Published: Wed Jan 07 2026 (01/07/2026, 07:17:34 UTC)
Source: CVE Database V5
Vendor/Project: audrasjb
Product: Key Figures

Description

CVE-2025-14792 is a stored cross-site scripting (XSS) vulnerability in the Key Figures WordPress plugin by audrasjb, affecting all versions up to 1. 1. It arises from insufficient input sanitization and output escaping in the kf_field_figure_default_color_render function. Exploitation requires administrator-level privileges and only affects multi-site WordPress installations or those with unfiltered_html disabled. The vulnerability allows injection of arbitrary scripts that execute when users access the compromised pages, potentially leading to session hijacking or privilege escalation. The CVSS score is 4. 4 (medium severity), reflecting the need for high privileges and the limited impact scope. No known exploits are currently reported in the wild. European organizations using this plugin in multi-site environments should prioritize patching or mitigating this issue to prevent potential abuse. Mitigations include restricting admin access, enabling strict content security policies, and monitoring for suspicious script injections.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:45:01 UTC

Technical Analysis

CVE-2025-14792 is a stored cross-site scripting vulnerability identified in the Key Figures plugin for WordPress, developed by audrasjb. The vulnerability exists in the kf_field_figure_default_color_render function, which fails to properly sanitize and escape user input before rendering it on web pages. This flaw allows authenticated attackers with administrator privileges to inject malicious JavaScript code into pages within multi-site WordPress installations or installations where the unfiltered_html capability is disabled. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially enabling session hijacking, privilege escalation, or other malicious activities. The vulnerability affects all versions up to and including 1.1 of the plugin. The CVSS 3.1 base score is 4.4, indicating medium severity, due to the requirement for high privileges (administrator) and the absence of user interaction for exploitation. The scope is considered changed (S:C) because the vulnerability can affect other users beyond the attacker. No public exploits have been reported to date. The vulnerability was published on January 7, 2026, and is tracked under CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page).

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments using WordPress multi-site installations with the Key Figures plugin. Successful exploitation could lead to unauthorized script execution in the context of other users, potentially compromising user sessions, stealing sensitive data, or enabling further attacks such as privilege escalation or malware deployment. Although exploitation requires administrator access, insider threats or compromised admin accounts could leverage this vulnerability to expand their control or disrupt operations. The impact on confidentiality and integrity is low to moderate, while availability is not affected. Organizations relying on WordPress multi-site setups for intranet portals, content management, or customer-facing sites may see reputational damage and compliance issues if exploited. Given the medium CVSS score and lack of known exploits, the immediate risk is moderate but should not be underestimated, especially in sectors with sensitive data or regulatory requirements such as finance, healthcare, and government.

Mitigation Recommendations

To mitigate CVE-2025-14792, European organizations should: 1) Immediately update the Key Figures plugin to a patched version once available, or temporarily disable the plugin in multi-site environments. 2) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3) Review and harden WordPress configuration by enabling security plugins that monitor and block suspicious script injections. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 5) Regularly audit multi-site installations for unauthorized changes or injected scripts, focusing on pages rendered by the vulnerable function. 6) Educate administrators about the risks of stored XSS and the importance of input validation and output escaping. 7) Disable or carefully manage the unfiltered_html capability to minimize exposure. 8) Monitor logs and user activity for signs of exploitation attempts or anomalous behavior. These steps go beyond generic advice by focusing on the specific conditions and attack vectors relevant to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-16T16:18:36.518Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e0d1ea55ed4ed99880fe0

Added to database: 1/7/2026, 7:37:02 AM

Last enriched: 1/14/2026, 3:45:01 PM

Last updated: 2/7/2026, 3:41:08 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats