CVE-2025-15058: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spwebguy Responsive Pricing Table
CVE-2025-15058 is a stored cross-site scripting (XSS) vulnerability in the Responsive Pricing Table WordPress plugin by spwebguy, affecting all versions up to 5. 1. 12. Authenticated users with Contributor-level access or higher can inject malicious scripts via the 'table_currency' parameter due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. While no known exploits are currently in the wild, the vulnerability poses a risk to websites using this plugin, especially those with multiple contributors. European organizations using WordPress sites with this plugin should prioritize patching or mitigating this issue to prevent exploitation. Countries with high WordPress adoption and active web development communities are more likely to be impacted.
AI Analysis
Technical Summary
The Responsive Pricing Table plugin for WordPress, developed by spwebguy, suffers from a stored cross-site scripting (XSS) vulnerability identified as CVE-2025-15058. This vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) in the 'table_currency' parameter, which is insufficiently sanitized and escaped before output. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into the pricing table content. Because the injected scripts are stored persistently, they execute in the context of any user who views the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of the victim. The vulnerability does not require user interaction beyond visiting the compromised page, and the attack vector is network-based with low attack complexity. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates that while the attacker needs some privileges, the impact on confidentiality and integrity is partial but significant, with no impact on availability. No official patches have been released yet, and no known exploits are reported in the wild. However, the widespread use of WordPress and the popularity of pricing table plugins make this a notable risk for websites that allow multiple contributors to edit content.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution on their WordPress sites, risking user data confidentiality and integrity. Attackers could hijack user sessions, deface websites, or inject malicious payloads such as phishing forms or malware delivery scripts. This is particularly concerning for organizations with public-facing websites that accept content contributions from multiple users, such as marketing teams or content creators. The compromise could damage brand reputation, lead to data breaches involving customer or employee information, and potentially violate GDPR requirements regarding data protection and breach notification. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the organization's network if internal users are targeted. The medium severity rating suggests a moderate but actionable risk that should not be ignored, especially given the ease of exploitation by authenticated users.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Responsive Pricing Table plugin and verify its version. Since no official patches are currently available, administrators should consider the following mitigations: restrict Contributor-level and higher permissions strictly to trusted users; implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'table_currency' parameter; sanitize and validate all user inputs at the application level where possible; monitor website content for unexpected script injections; and educate content contributors about the risks of injecting untrusted content. Additionally, organizations should plan to update the plugin promptly once a patch is released. Employing Content Security Policy (CSP) headers can also help mitigate the impact of XSS by restricting script execution sources. Regular security audits and monitoring for anomalous activities on WordPress sites are recommended to detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-15058: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spwebguy Responsive Pricing Table
Description
CVE-2025-15058 is a stored cross-site scripting (XSS) vulnerability in the Responsive Pricing Table WordPress plugin by spwebguy, affecting all versions up to 5. 1. 12. Authenticated users with Contributor-level access or higher can inject malicious scripts via the 'table_currency' parameter due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other malicious actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. While no known exploits are currently in the wild, the vulnerability poses a risk to websites using this plugin, especially those with multiple contributors. European organizations using WordPress sites with this plugin should prioritize patching or mitigating this issue to prevent exploitation. Countries with high WordPress adoption and active web development communities are more likely to be impacted.
AI-Powered Analysis
Technical Analysis
The Responsive Pricing Table plugin for WordPress, developed by spwebguy, suffers from a stored cross-site scripting (XSS) vulnerability identified as CVE-2025-15058. This vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) in the 'table_currency' parameter, which is insufficiently sanitized and escaped before output. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into the pricing table content. Because the injected scripts are stored persistently, they execute in the context of any user who views the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of the victim. The vulnerability does not require user interaction beyond visiting the compromised page, and the attack vector is network-based with low attack complexity. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates that while the attacker needs some privileges, the impact on confidentiality and integrity is partial but significant, with no impact on availability. No official patches have been released yet, and no known exploits are reported in the wild. However, the widespread use of WordPress and the popularity of pricing table plugins make this a notable risk for websites that allow multiple contributors to edit content.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution on their WordPress sites, risking user data confidentiality and integrity. Attackers could hijack user sessions, deface websites, or inject malicious payloads such as phishing forms or malware delivery scripts. This is particularly concerning for organizations with public-facing websites that accept content contributions from multiple users, such as marketing teams or content creators. The compromise could damage brand reputation, lead to data breaches involving customer or employee information, and potentially violate GDPR requirements regarding data protection and breach notification. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the organization's network if internal users are targeted. The medium severity rating suggests a moderate but actionable risk that should not be ignored, especially given the ease of exploitation by authenticated users.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Responsive Pricing Table plugin and verify its version. Since no official patches are currently available, administrators should consider the following mitigations: restrict Contributor-level and higher permissions strictly to trusted users; implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'table_currency' parameter; sanitize and validate all user inputs at the application level where possible; monitor website content for unexpected script injections; and educate content contributors about the risks of injecting untrusted content. Additionally, organizations should plan to update the plugin promptly once a patch is released. Employing Content Security Policy (CSP) headers can also help mitigate the impact of XSS by restricting script execution sources. Regular security audits and monitoring for anomalous activities on WordPress sites are recommended to detect exploitation attempts early.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-23T19:31:54.374Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c147349d0379d7d581e
Added to database: 1/7/2026, 12:05:40 PM
Last enriched: 1/14/2026, 4:00:31 PM
Last updated: 2/6/2026, 7:51:07 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2064: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2026-25727: CWE-121: Stack-based Buffer Overflow in time-rs time
MediumCVE-2026-25643: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in blakeblackshear frigate
CriticalCVE-2026-1709: Key Exchange without Entity Authentication in Red Hat Red Hat Enterprise Linux 10
CriticalCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.