CVE-2025-14984: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jegstudio Gutenverse Form – Contact Form Builder, Booking, Reservation, Subscribe for Block Editor
The Gutenverse Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file upload in all versions up to, and including, 2.3.2. This is due to the plugin's framework component adding SVG to the allowed MIME types via the upload_mimes filter without implementing any sanitization of SVG file contents. This makes it possible for authenticated attackers, with Author-level access and above, to upload SVG files containing malicious JavaScript that executes when the file is viewed, leading to arbitrary JavaScript execution in victims' browsers.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14984 affects the Gutenverse Form plugin for WordPress, a widely used contact form, booking, and subscription builder. The root cause is the plugin's framework component adding SVG files to the allowed MIME types via the WordPress upload_mimes filter without any sanitization or validation of the SVG content. SVG files can contain embedded JavaScript, and because the plugin does not neutralize or sanitize this input, an authenticated attacker with Author-level privileges or higher can upload a crafted SVG file containing malicious scripts. When other users or administrators view the SVG file within the WordPress environment, the embedded JavaScript executes in their browsers, resulting in stored cross-site scripting (XSS). This can lead to theft of authentication cookies, session tokens, or execution of arbitrary actions on behalf of the victim. The vulnerability requires authentication but no additional user interaction, and it affects all plugin versions up to and including 2.3.2. The CVSS 3.1 base score is 6.4, indicating a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and impacts on confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple users or administrators. The lack of a patch at the time of publication necessitates immediate mitigation steps to reduce exposure.
Potential Impact
This vulnerability can have serious consequences for organizations running WordPress sites with the Gutenverse Form plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of other users’ browsers, potentially leading to session hijacking, credential theft, unauthorized actions, or further compromise of the website. Since the attack requires authenticated access at the Author level or above, sites with multiple contributors or less restrictive user roles are at higher risk. The impact includes loss of confidentiality and integrity of user sessions and data, potential defacement, or pivoting to more severe attacks such as privilege escalation or malware deployment. The vulnerability does not directly affect availability but can indirectly disrupt operations if exploited. Organizations with public-facing WordPress sites that rely on this plugin for contact forms, booking, or subscription management are particularly vulnerable. The medium CVSS score reflects the balance between the need for authentication and the significant potential damage from exploitation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict or disable SVG file uploads within the Gutenverse Form plugin or WordPress media settings until a patch is available. Implement strict user role management to limit Author-level or higher privileges only to trusted users. Employ web application firewalls (WAFs) with rules to detect and block malicious SVG payloads or suspicious file uploads. Use security plugins that sanitize SVG files or remove JavaScript content from SVGs before upload. Monitor logs for unusual upload activity or unexpected SVG file usage. Regularly update the Gutenverse Form plugin and WordPress core to the latest versions once a security patch addressing this vulnerability is released. Additionally, conduct security awareness training for users with elevated privileges to recognize potential phishing or social engineering attempts that could lead to exploitation. Finally, consider implementing Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of XSS attacks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, Brazil, India
CVE-2025-14984: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jegstudio Gutenverse Form – Contact Form Builder, Booking, Reservation, Subscribe for Block Editor
Description
The Gutenverse Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file upload in all versions up to, and including, 2.3.2. This is due to the plugin's framework component adding SVG to the allowed MIME types via the upload_mimes filter without implementing any sanitization of SVG file contents. This makes it possible for authenticated attackers, with Author-level access and above, to upload SVG files containing malicious JavaScript that executes when the file is viewed, leading to arbitrary JavaScript execution in victims' browsers.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-14984 affects the Gutenverse Form plugin for WordPress, a widely used contact form, booking, and subscription builder. The root cause is the plugin's framework component adding SVG files to the allowed MIME types via the WordPress upload_mimes filter without any sanitization or validation of the SVG content. SVG files can contain embedded JavaScript, and because the plugin does not neutralize or sanitize this input, an authenticated attacker with Author-level privileges or higher can upload a crafted SVG file containing malicious scripts. When other users or administrators view the SVG file within the WordPress environment, the embedded JavaScript executes in their browsers, resulting in stored cross-site scripting (XSS). This can lead to theft of authentication cookies, session tokens, or execution of arbitrary actions on behalf of the victim. The vulnerability requires authentication but no additional user interaction, and it affects all plugin versions up to and including 2.3.2. The CVSS 3.1 base score is 6.4, indicating a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and impacts on confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple users or administrators. The lack of a patch at the time of publication necessitates immediate mitigation steps to reduce exposure.
Potential Impact
This vulnerability can have serious consequences for organizations running WordPress sites with the Gutenverse Form plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of other users’ browsers, potentially leading to session hijacking, credential theft, unauthorized actions, or further compromise of the website. Since the attack requires authenticated access at the Author level or above, sites with multiple contributors or less restrictive user roles are at higher risk. The impact includes loss of confidentiality and integrity of user sessions and data, potential defacement, or pivoting to more severe attacks such as privilege escalation or malware deployment. The vulnerability does not directly affect availability but can indirectly disrupt operations if exploited. Organizations with public-facing WordPress sites that rely on this plugin for contact forms, booking, or subscription management are particularly vulnerable. The medium CVSS score reflects the balance between the need for authentication and the significant potential damage from exploitation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict or disable SVG file uploads within the Gutenverse Form plugin or WordPress media settings until a patch is available. Implement strict user role management to limit Author-level or higher privileges only to trusted users. Employ web application firewalls (WAFs) with rules to detect and block malicious SVG payloads or suspicious file uploads. Use security plugins that sanitize SVG files or remove JavaScript content from SVGs before upload. Monitor logs for unusual upload activity or unexpected SVG file usage. Regularly update the Gutenverse Form plugin and WordPress core to the latest versions once a security patch addressing this vulnerability is released. Additionally, conduct security awareness training for users with elevated privileges to recognize potential phishing or social engineering attempts that could lead to exploitation. Finally, consider implementing Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of XSS attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-19T18:47:27.464Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695f7a58c901b06321d0bb32
Added to database: 1/8/2026, 9:35:20 AM
Last enriched: 2/27/2026, 11:48:04 AM
Last updated: 3/25/2026, 2:52:46 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.