CVE-2025-2892: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
The All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post Meta Description and Canonical URL parameters in all versions up to, and including, 4.8.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-2892 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic' developed by smub. This vulnerability affects all versions up to and including 4.8.1.1. The root cause is improper neutralization of input during web page generation (CWE-79), specifically insufficient sanitization and escaping of user-supplied data in the post Meta Description and Canonical URL parameters. An authenticated attacker with Contributor-level privileges or higher can exploit this flaw by injecting malicious JavaScript code into these parameters. Because the malicious script is stored persistently in the website’s database, it executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. The CVSS v3.1 base score is 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the contributor level, but no user interaction is needed for the exploit to succeed once the malicious payload is stored. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet. Given the widespread use of WordPress and the popularity of SEO plugins, this vulnerability poses a significant risk to websites relying on this plugin for SEO management.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution on their websites, compromising user data confidentiality and website integrity. Attackers could steal session cookies, deface websites, or redirect visitors to phishing or malware sites, damaging brand reputation and customer trust. Organizations in sectors such as e-commerce, media, and government that rely heavily on WordPress for their web presence are particularly at risk. The stored nature of the XSS means that once exploited, the malicious payload can affect all visitors to the compromised pages, amplifying the impact. Additionally, GDPR compliance could be jeopardized if personal data is exposed or manipulated due to this vulnerability, leading to regulatory penalties. The medium severity score reflects the need for timely remediation, especially since exploitation requires only contributor-level access, which might be obtained through social engineering or weak credential management.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the vulnerable 'All in One SEO' plugin versions up to 4.8.1.1. Until an official patch is released, organizations should consider temporarily disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls and review user roles to ensure that only trusted users have contributor-level or higher privileges. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the Meta Description and Canonical URL fields. Conduct regular security scans to detect injected scripts and sanitize existing content. Educate content contributors about the risks of injecting untrusted content. Once a patch is available, prioritize prompt updating of the plugin. Additionally, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and monitor web server logs for unusual activity indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-2892: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
Description
The All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post Meta Description and Canonical URL parameters in all versions up to, and including, 4.8.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-2892 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic' developed by smub. This vulnerability affects all versions up to and including 4.8.1.1. The root cause is improper neutralization of input during web page generation (CWE-79), specifically insufficient sanitization and escaping of user-supplied data in the post Meta Description and Canonical URL parameters. An authenticated attacker with Contributor-level privileges or higher can exploit this flaw by injecting malicious JavaScript code into these parameters. Because the malicious script is stored persistently in the website’s database, it executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. The CVSS v3.1 base score is 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the contributor level, but no user interaction is needed for the exploit to succeed once the malicious payload is stored. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet. Given the widespread use of WordPress and the popularity of SEO plugins, this vulnerability poses a significant risk to websites relying on this plugin for SEO management.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution on their websites, compromising user data confidentiality and website integrity. Attackers could steal session cookies, deface websites, or redirect visitors to phishing or malware sites, damaging brand reputation and customer trust. Organizations in sectors such as e-commerce, media, and government that rely heavily on WordPress for their web presence are particularly at risk. The stored nature of the XSS means that once exploited, the malicious payload can affect all visitors to the compromised pages, amplifying the impact. Additionally, GDPR compliance could be jeopardized if personal data is exposed or manipulated due to this vulnerability, leading to regulatory penalties. The medium severity score reflects the need for timely remediation, especially since exploitation requires only contributor-level access, which might be obtained through social engineering or weak credential management.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the vulnerable 'All in One SEO' plugin versions up to 4.8.1.1. Until an official patch is released, organizations should consider temporarily disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls and review user roles to ensure that only trusted users have contributor-level or higher privileges. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the Meta Description and Canonical URL fields. Conduct regular security scans to detect injected scripts and sanitize existing content. Educate content contributors about the risks of injecting untrusted content. Once a patch is available, prioritize prompt updating of the plugin. Additionally, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and monitor web server logs for unusual activity indicative of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-27T23:17:48.798Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb835
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 8:48:56 PM
Last updated: 8/7/2025, 1:31:51 AM
Views: 19
Related Threats
CVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-31961: CWE-1220 Insufficient Granularity of Access Control in HCL Software Connections
LowCVE-2025-9008: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.