CVE-2025-2874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in specialk User Submitted Posts – Enable Users to Submit Posts from the Front End
CVE-2025-2874 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'User Submitted Posts – Enable Users to Submit Posts from the Front End' by specialk. It affects all versions up to and including 20240319, specifically in multi-site WordPress installations where unfiltered_html is disabled. The flaw allows authenticated users with administrator-level permissions or higher to inject malicious scripts via admin settings, which execute when other users access the compromised pages. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation requires high privileges and does not need user interaction but can compromise confidentiality and integrity of affected sites. The CVSS score is 4. 4 (medium severity), reflecting limited impact and higher attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin in multi-site configurations should prioritize patching or applying mitigations to prevent potential script injection attacks.
AI Analysis
Technical Summary
CVE-2025-2874 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the WordPress plugin 'User Submitted Posts – Enable Users to Submit Posts from the Front End' developed by specialk. This vulnerability affects all plugin versions up to and including 20240319. The root cause is insufficient sanitization of user input and inadequate output escaping in the plugin's admin settings functionality. Specifically, in multi-site WordPress installations where the 'unfiltered_html' capability is disabled, authenticated users with administrator-level permissions or higher can inject arbitrary JavaScript code into posts or pages via the plugin's front-end post submission feature. When other users visit these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, data theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires authenticated access with high privileges, making exploitation more complex and limiting the attack surface. The CVSS v3.1 base score is 4.4, indicating medium severity, with attack vector network, high attack complexity, high privileges required, no user interaction, and a scope change. No public exploits have been reported yet. The vulnerability is particularly relevant for WordPress multi-site environments using this plugin, which are common in organizations managing multiple sites under a single installation.
Potential Impact
The impact of CVE-2025-2874 is primarily on the confidentiality and integrity of affected WordPress multi-site environments. Successful exploitation allows an attacker with administrator-level access to inject persistent malicious scripts that execute in the context of other users visiting the compromised pages. This can lead to theft of sensitive information such as authentication cookies, enabling session hijacking, unauthorized actions performed with victim privileges, and potential further compromise of the site or network. Although availability is not directly affected, the injected scripts could be used to deliver malware or redirect users to malicious sites, indirectly impacting user trust and site reputation. The requirement for high privileges limits the threat to insiders or compromised administrator accounts, but the multi-site context increases the potential scope of impact across multiple sites managed under the same installation. Organizations relying on this plugin in multi-site setups face risks of data leakage, unauthorized administrative actions, and reputational damage if the vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-2874, organizations should immediately update the 'User Submitted Posts – Enable Users to Submit Posts from the Front End' plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict plugin usage to trusted users only and audit administrator accounts to prevent unauthorized access. Disabling the plugin in multi-site environments or limiting its functionality can reduce exposure. Additionally, enabling the 'unfiltered_html' capability cautiously or reviewing the configuration to ensure it aligns with security policies may help mitigate risk. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection attempts can provide temporary protection. Regularly monitoring logs for unusual administrator activity and scanning for injected scripts on pages can help detect exploitation attempts early. Finally, educating administrators about the risks of XSS and enforcing strong authentication controls reduces the likelihood of privilege misuse.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-2874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in specialk User Submitted Posts – Enable Users to Submit Posts from the Front End
Description
CVE-2025-2874 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'User Submitted Posts – Enable Users to Submit Posts from the Front End' by specialk. It affects all versions up to and including 20240319, specifically in multi-site WordPress installations where unfiltered_html is disabled. The flaw allows authenticated users with administrator-level permissions or higher to inject malicious scripts via admin settings, which execute when other users access the compromised pages. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation requires high privileges and does not need user interaction but can compromise confidentiality and integrity of affected sites. The CVSS score is 4. 4 (medium severity), reflecting limited impact and higher attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin in multi-site configurations should prioritize patching or applying mitigations to prevent potential script injection attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-2874 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the WordPress plugin 'User Submitted Posts – Enable Users to Submit Posts from the Front End' developed by specialk. This vulnerability affects all plugin versions up to and including 20240319. The root cause is insufficient sanitization of user input and inadequate output escaping in the plugin's admin settings functionality. Specifically, in multi-site WordPress installations where the 'unfiltered_html' capability is disabled, authenticated users with administrator-level permissions or higher can inject arbitrary JavaScript code into posts or pages via the plugin's front-end post submission feature. When other users visit these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, data theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires authenticated access with high privileges, making exploitation more complex and limiting the attack surface. The CVSS v3.1 base score is 4.4, indicating medium severity, with attack vector network, high attack complexity, high privileges required, no user interaction, and a scope change. No public exploits have been reported yet. The vulnerability is particularly relevant for WordPress multi-site environments using this plugin, which are common in organizations managing multiple sites under a single installation.
Potential Impact
The impact of CVE-2025-2874 is primarily on the confidentiality and integrity of affected WordPress multi-site environments. Successful exploitation allows an attacker with administrator-level access to inject persistent malicious scripts that execute in the context of other users visiting the compromised pages. This can lead to theft of sensitive information such as authentication cookies, enabling session hijacking, unauthorized actions performed with victim privileges, and potential further compromise of the site or network. Although availability is not directly affected, the injected scripts could be used to deliver malware or redirect users to malicious sites, indirectly impacting user trust and site reputation. The requirement for high privileges limits the threat to insiders or compromised administrator accounts, but the multi-site context increases the potential scope of impact across multiple sites managed under the same installation. Organizations relying on this plugin in multi-site setups face risks of data leakage, unauthorized administrative actions, and reputational damage if the vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-2874, organizations should immediately update the 'User Submitted Posts – Enable Users to Submit Posts from the Front End' plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict plugin usage to trusted users only and audit administrator accounts to prevent unauthorized access. Disabling the plugin in multi-site environments or limiting its functionality can reduce exposure. Additionally, enabling the 'unfiltered_html' capability cautiously or reviewing the configuration to ensure it aligns with security policies may help mitigate risk. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection attempts can provide temporary protection. Regularly monitoring logs for unusual administrator activity and scanning for injected scripts on pages can help detect exploitation attempts early. Finally, educating administrators about the risks of XSS and enforcing strong authentication controls reduces the likelihood of privilege misuse.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-27T14:51:27.637Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b26b7ef31ef0b54eb0e
Added to database: 2/25/2026, 9:35:34 PM
Last enriched: 2/25/2026, 10:28:56 PM
Last updated: 2/26/2026, 9:33:08 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.