Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15522: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in uncannyowl Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin

0
Medium
VulnerabilityCVE-2025-15522cvecve-2025-15522cwe-79
Published: Fri Jan 23 2026 (01/23/2026, 04:34:58 UTC)
Source: CVE Database V5
Vendor/Project: uncannyowl
Product: Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin

Description

CVE-2025-15522 is a stored cross-site scripting (XSS) vulnerability in the Uncanny Automator WordPress plugin affecting all versions up to 6. 10. 0. 2. The flaw arises from insufficient sanitization and escaping of the verified_message parameter in the automator_discord_user_mapping shortcode. Authenticated users with Contributor-level access or higher can inject malicious scripts that execute when users with verified Discord accounts view the affected pages. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with potential impacts on confidentiality and integrity but no direct availability impact. Exploitation requires authentication but no user interaction beyond viewing the page. There are no known exploits in the wild or patches currently available.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:12:03 UTC

Technical Analysis

CVE-2025-15522 is a stored cross-site scripting vulnerability identified in the Uncanny Automator plugin for WordPress, specifically affecting all versions up to and including 6.10.0.2. The vulnerability is due to improper neutralization of input during web page generation (CWE-79), where the plugin fails to adequately sanitize and escape the 'verified_message' parameter within the 'automator_discord_user_mapping' shortcode. This flaw allows authenticated attackers with at least Contributor-level privileges to inject arbitrary JavaScript code into pages that are rendered for users with verified Discord accounts. When these users access the compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network (remote), low attack complexity, requiring privileges (Contributor or higher), no user interaction, and a scope change indicating that the vulnerability affects resources beyond the attacker’s privileges. There are no known public exploits or patches at the time of publication, increasing the urgency for organizations to implement mitigations. The plugin’s integration with Discord user verification mechanisms makes it a targeted vector for attackers aiming to compromise user sessions or escalate privileges within WordPress environments that leverage Discord for authentication or community engagement.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those operating WordPress sites that utilize the Uncanny Automator plugin with Discord integration. The ability for an authenticated Contributor-level user to inject persistent malicious scripts can lead to the compromise of user accounts, including administrators, through session hijacking or theft of authentication tokens. This undermines the confidentiality and integrity of sensitive data managed via the affected websites. While the vulnerability does not directly impact availability, the resulting unauthorized actions could lead to data manipulation or unauthorized access to internal systems. Organizations in sectors such as e-commerce, education, and community platforms that rely on WordPress and Discord for user engagement are especially vulnerable. The medium severity rating suggests a moderate but actionable threat, with exploitation complexity being low once authenticated access is obtained. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details are public. Failure to address this vulnerability could result in reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and financial losses.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, monitor the vendor’s official channels for patches or updates addressing CVE-2025-15522 and apply them promptly once available. Until a patch is released, restrict Contributor-level access to trusted users only, minimizing the risk of malicious script injection. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'verified_message' parameter in the shortcode. Conduct thorough input validation and output encoding on any custom code interacting with this plugin to reduce injection risks. Enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly audit user roles and permissions to ensure least privilege principles are enforced. Additionally, educate users with verified Discord accounts about the risks of accessing untrusted or suspicious pages within the site. Finally, consider isolating or disabling the Discord integration feature temporarily if it is not critical to operations until the vulnerability is resolved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-14T15:50:21.489Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697301b44623b1157c02f7dd

Added to database: 1/23/2026, 5:05:56 AM

Last enriched: 1/30/2026, 10:12:03 AM

Last updated: 2/5/2026, 10:33:24 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats