Skip to main content

CVE-2025-2929: CWE-79 Cross-Site Scripting (XSS) in Order Delivery Date

High
VulnerabilityCVE-2025-2929cvecve-2025-2929cwe-79
Published: Tue May 20 2025 (05/20/2025, 06:00:06 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Order Delivery Date

Description

The Order Delivery Date WordPress plugin before 12.4.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

AI-Powered Analysis

AILast updated: 07/11/2025, 13:46:24 UTC

Technical Analysis

CVE-2025-2929 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'Order Delivery Date' version 2.0 and earlier. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input parameters before reflecting them back in the web page output. Specifically, an attacker can craft a malicious URL or input containing executable JavaScript code that, when accessed by a high-privilege user such as an administrator, executes in their browser context. This reflected XSS attack vector allows the attacker to bypass the same-origin policy, potentially leading to session hijacking, privilege escalation, unauthorized actions, or theft of sensitive information. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The CVSS v3.1 base score of 7.1 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component, with low confidentiality, integrity, and availability impacts individually, but combined can be significant. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet. The vulnerability was reserved in March 2025 and published in May 2025, with WPScan as the assigner. This vulnerability is particularly dangerous because it targets high-privilege users, increasing the potential damage if exploited.

Potential Impact

For European organizations using the Order Delivery Date WordPress plugin, this vulnerability poses a significant risk, especially to administrators and users with elevated privileges. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the victim's browser, leading to session hijacking, unauthorized administrative actions, or data theft. This can compromise the confidentiality and integrity of sensitive business and customer data. Since WordPress is widely used across Europe for e-commerce and content management, organizations relying on this plugin for order management could face operational disruptions and reputational damage. Additionally, GDPR compliance requires protection of personal data, and exploitation of this vulnerability could lead to data breaches subject to regulatory penalties. The reflected nature of the XSS means phishing campaigns or social engineering could be used to lure administrators into clicking malicious links, increasing the attack surface. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score indicates that the threat should be taken seriously.

Mitigation Recommendations

1. Immediate mitigation involves restricting access to the WordPress admin panel to trusted IP addresses or VPNs to reduce exposure to malicious links. 2. Implement Web Application Firewall (WAF) rules specifically targeting reflected XSS patterns related to the Order Delivery Date plugin parameters. 3. Educate administrators and high-privilege users to avoid clicking suspicious links and to verify URLs before accessing the admin interface. 4. Monitor web server and application logs for unusual query parameters or repeated access attempts that could indicate exploitation attempts. 5. Since no official patch is currently available, consider temporarily disabling or replacing the Order Delivery Date plugin with an alternative that properly sanitizes inputs. 6. Follow up closely with the plugin vendor or WordPress security advisories for timely patch releases and apply updates immediately upon availability. 7. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS payloads. 8. Conduct regular security audits and penetration testing focusing on plugin vulnerabilities and input validation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-03-28T13:48:44.434Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb0eb

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:46:24 PM

Last updated: 8/11/2025, 11:36:27 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats