Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mehrazmorshed Login Manager – Design Login Page, View Login Activity, Limit Login Attempts

0
Medium
VulnerabilityCVE-2025-2613cvecve-2025-2613cwe-79
Published: Fri Apr 18 2025 (04/18/2025, 01:44:10 UTC)
Source: CVE Database V5
Vendor/Project: mehrazmorshed
Product: Login Manager – Design Login Page, View Login Activity, Limit Login Attempts

Description

CVE-2025-2613 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Login Manager – Design Login Page, View Login Activity, Limit Login Attempts' by mehrazmorshed, affecting all versions up to 2. 0. 5. The flaw arises from insufficient input sanitization and output escaping of custom logo and background URLs, allowing authenticated administrators to inject malicious scripts. This vulnerability impacts multi-site WordPress installations or those with unfiltered_html disabled. Exploitation requires administrator-level privileges and does not require user interaction, but the attack surface is limited to environments meeting these conditions. The CVSS score is 4. 4 (medium severity), reflecting limited impact on confidentiality and integrity, no impact on availability, and a high attack complexity. No known public exploits exist yet. Organizations using this plugin in multi-site setups should prioritize patching or mitigating this issue to prevent potential persistent XSS attacks that could compromise administrative sessions or site integrity.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:26:18 UTC

Technical Analysis

CVE-2025-2613 is a stored cross-site scripting vulnerability classified under CWE-79, found in the WordPress plugin 'Login Manager – Design Login Page, View Login Activity, Limit Login Attempts' developed by mehrazmorshed. The vulnerability affects all versions up to and including 2.0.5. It stems from improper neutralization of input during web page generation, specifically in the handling of custom logo and background URLs. These inputs are not sufficiently sanitized or escaped before being rendered, allowing an attacker with administrator-level privileges to inject arbitrary JavaScript code. The malicious script is stored persistently and executed whenever a user accesses the affected page, potentially compromising user sessions or performing unauthorized actions. This vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the attack surface. The CVSS 3.1 base score is 4.4, indicating medium severity, with the vector showing network attack vector, high attack complexity, and requiring privileges but no user interaction. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those handling administrative functions and customizable UI elements.

Potential Impact

The primary impact of CVE-2025-2613 is the potential for persistent cross-site scripting attacks within WordPress multi-site environments using the vulnerable plugin. An attacker with administrator privileges can inject malicious scripts that execute in the context of other administrators or users with elevated permissions. This can lead to session hijacking, unauthorized actions performed on behalf of users, theft of sensitive information such as authentication tokens, or defacement of administrative pages. Although the vulnerability does not directly affect availability, the integrity and confidentiality of the affected sites can be compromised. The requirement for administrator-level access limits the risk to insider threats or attackers who have already breached lower privilege levels. However, in large organizations or managed hosting environments with multiple administrators, the risk of lateral movement and privilege escalation increases. The vulnerability could also be leveraged as part of a broader attack chain to establish persistence or pivot to other systems. Organizations relying on multi-site WordPress installations with this plugin should consider the risk significant enough to warrant immediate attention.

Mitigation Recommendations

To mitigate CVE-2025-2613, organizations should first verify if they are using the 'Login Manager – Design Login Page, View Login Activity, Limit Login Attempts' plugin, particularly in multi-site WordPress environments or where unfiltered_html is disabled. Since no official patch links are currently available, administrators should consider temporarily disabling the plugin or restricting administrator access to trusted personnel only. Review and sanitize all custom logo and background URL inputs manually if possible. Implement a Web Application Firewall (WAF) with rules to detect and block typical XSS payloads targeting this plugin. Monitor administrative activity logs for suspicious changes to UI customization settings. Educate administrators on the risks of injecting untrusted content and enforce the principle of least privilege to minimize the number of users with administrator rights. Regularly check for updates from the plugin vendor and apply patches promptly once released. Additionally, consider deploying Content Security Policy (CSP) headers to reduce the impact of any injected scripts. Conduct periodic security audits and vulnerability scans focusing on WordPress plugins and multi-site configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-21T16:37:31.081Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b25b7ef31ef0b54e998

Added to database: 2/25/2026, 9:35:33 PM

Last enriched: 2/25/2026, 10:26:18 PM

Last updated: 2/26/2026, 10:33:52 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats