Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1559: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in clearcodehq CC-IMG-Shortcode

0
Medium
VulnerabilityCVE-2025-1559cvecve-2025-1559cwe-79
Published: Thu Mar 13 2025 (03/13/2025, 01:45:27 UTC)
Source: CVE Database V5
Vendor/Project: clearcodehq
Product: CC-IMG-Shortcode

Description

CVE-2025-1559 is a stored cross-site scripting (XSS) vulnerability in the CC-IMG-Shortcode WordPress plugin up to version 1. 1. 0. It arises from insufficient input sanitization and output escaping of user-supplied attributes in the 'img' shortcode. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when any user views the affected page. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with potential impacts on confidentiality and integrity but no direct availability impact. Exploitation requires authentication but no user interaction beyond viewing the infected page. No known public exploits exist yet. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent potential session hijacking, data theft, or defacement attacks.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:03:32 UTC

Technical Analysis

CVE-2025-1559 is a stored cross-site scripting (XSS) vulnerability identified in the CC-IMG-Shortcode plugin for WordPress, affecting all versions up to and including 1.1.0. The root cause is improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of user-supplied attributes in the plugin's 'img' shortcode. This flaw allows authenticated users with contributor-level permissions or higher to inject arbitrary JavaScript code into pages or posts. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based (remote), with low attack complexity, requiring privileges (authenticated contributor or above), and no user interaction beyond viewing the infected content. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. Confidentiality and integrity impacts are low, while availability is unaffected. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where multiple users have contributor or higher roles. The plugin is widely used in WordPress sites that rely on shortcode-based image embedding, making the attack surface significant. The vulnerability was published on March 13, 2025, and no official patches or updates have been linked yet, increasing the urgency for mitigation.

Potential Impact

The primary impact of CVE-2025-1559 is the potential compromise of user confidentiality and integrity on affected WordPress sites. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors or administrators, enabling session hijacking, theft of sensitive information such as cookies or credentials, and unauthorized actions performed with the victim's privileges. This can lead to account takeover, defacement, or further exploitation of the site. Although availability is not directly impacted, the reputational damage and potential data breaches can have significant operational and financial consequences. Organizations with multi-user WordPress environments, especially those granting contributor or higher roles to untrusted users, are at elevated risk. The vulnerability can be exploited remotely over the network without user interaction beyond page viewing, increasing the likelihood of exploitation once discovered. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly. The scope change indicates that the vulnerability can affect components beyond the plugin itself, potentially impacting the entire WordPress site and its users.

Mitigation Recommendations

To mitigate CVE-2025-1559, organizations should first check for and apply any official patches or updates from the clearcodehq vendor as soon as they become available. In the absence of patches, administrators should restrict contributor-level and higher permissions to trusted users only, minimizing the risk of malicious shortcode injection. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious shortcode attribute inputs can provide temporary protection. Site owners should audit existing content for injected scripts and remove any suspicious shortcodes. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, hardening WordPress security by disabling untrusted plugins, enforcing strong user authentication, and monitoring logs for unusual activity is recommended. Developers maintaining the plugin should update input validation and output escaping routines to properly sanitize all user-supplied attributes in shortcodes. Finally, educating content contributors about safe content practices and the risks of injecting untrusted code can reduce accidental exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-21T16:33:54.206Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b15b7ef31ef0b54dee8

Added to database: 2/25/2026, 9:35:17 PM

Last enriched: 2/25/2026, 10:03:32 PM

Last updated: 2/26/2026, 9:48:00 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats