Skip to main content

CVE-2025-3510: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tagDiv tagDiv Composer

Medium
VulnerabilityCVE-2025-3510cvecve-2025-3510cwe-79
Published: Fri May 02 2025 (05/02/2025, 03:21:18 UTC)
Source: CVE
Vendor/Project: tagDiv
Product: tagDiv Composer

Description

The tagDiv Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple shortcodes in all versions up to, and including, 5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 06/26/2025, 00:30:09 UTC

Technical Analysis

CVE-2025-3510 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the tagDiv Composer plugin for WordPress, a popular page builder used to create and customize website content. The vulnerability exists in all versions up to and including 5.4 due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of user-supplied attributes within multiple shortcodes. An authenticated attacker with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages via these shortcodes. Because the malicious script is stored persistently in the page content, it executes whenever any user, including administrators or other privileged users, accesses the compromised page. This can lead to session hijacking, privilege escalation, defacement, or redirection to malicious sites. The CVSS 3.1 base score of 6.4 reflects a medium severity, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality and integrity with no availability impact. The vulnerability’s scope is changed (S:C) because the injected script can affect other users beyond the attacker. No known exploits are currently reported in the wild, but the presence of this vulnerability in a widely used WordPress plugin makes it a significant risk if left unpatched. No official patch links are provided yet, indicating that mitigation relies on workaround or access control until an update is released.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the tagDiv Composer plugin. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, violating GDPR requirements. Integrity of website content can be compromised, potentially damaging brand reputation and trust. Attackers could leverage this to conduct phishing campaigns or deliver malware to site visitors, increasing the risk of broader compromise. Since WordPress powers a significant portion of European business and media websites, especially small and medium enterprises, the impact could be widespread. Organizations in sectors with high regulatory scrutiny (finance, healthcare, government) may face additional compliance and legal consequences if exploited. The vulnerability requires contributor-level access, so insider threats or compromised accounts increase risk. The lack of user interaction for exploitation means automated attacks could be feasible once exploit code is developed, raising the urgency for mitigation.

Mitigation Recommendations

1. Immediately audit user roles and permissions on WordPress sites using tagDiv Composer to ensure only trusted users have contributor-level or higher access. 2. Implement strict input validation and sanitization at the application layer where possible, including disabling or restricting shortcode usage from untrusted users. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode payloads or script injection patterns targeting tagDiv Composer. 4. Monitor website content for unexpected script tags or unusual shortcode attributes indicative of exploitation attempts. 5. Until an official patch is released, consider temporarily disabling the tagDiv Composer plugin or limiting its usage to reduce attack surface. 6. Educate content contributors on safe content practices and the risks of injecting untrusted code. 7. Regularly back up website data and maintain incident response plans to quickly restore clean versions if compromise occurs. 8. Stay alert for vendor updates or security advisories providing patches or further mitigation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-10T20:49:20.706Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec08e

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/26/2025, 12:30:09 AM

Last updated: 7/31/2025, 2:36:47 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats