Skip to main content

CVE-2025-39409: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pressaholic WordPress Video Robot - The Ultimate Video Importer

High
VulnerabilityCVE-2025-39409cvecve-2025-39409cwe-79
Published: Mon May 19 2025 (05/19/2025, 19:03:42 UTC)
Source: CVE
Vendor/Project: pressaholic
Product: WordPress Video Robot - The Ultimate Video Importer

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pressaholic WordPress Video Robot - The Ultimate Video Importer.This issue affects WordPress Video Robot - The Ultimate Video Importer: from n/a through 1.20.0.

AI-Powered Analysis

AILast updated: 07/11/2025, 16:17:46 UTC

Technical Analysis

CVE-2025-39409 is a high-severity Cross-site Scripting (XSS) vulnerability identified in the WordPress plugin 'WordPress Video Robot - The Ultimate Video Importer' developed by pressaholic. This vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Specifically, the plugin fails to adequately sanitize or encode user-supplied input before rendering it in web pages, allowing attackers to inject malicious scripts. The affected versions include all versions up to and including 1.20.0. The vulnerability has a CVSS 3.1 base score of 7.1, indicating a high impact with the vector: Network attack (AV:N), low attack complexity (AC:L), no privileges required (PR:N), requires user interaction (UI:R), scope changed (S:C), and impacts confidentiality, integrity, and availability at a low level (C:L/I:L/A:L). Exploitation involves tricking an authenticated user into interacting with crafted content, which then executes malicious JavaScript in the context of the victim's browser session. This can lead to session hijacking, defacement, or redirection to malicious sites. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for websites using this plugin. The plugin is used to import and display video content on WordPress sites, which are common across various industries, including media, education, and e-commerce.

Potential Impact

For European organizations, this vulnerability poses a notable threat, especially for those relying on WordPress sites with the affected plugin installed. Successful exploitation can compromise user sessions, leading to unauthorized access to sensitive information, defacement of public-facing websites, and potential distribution of malware to visitors. This can damage organizational reputation, violate data protection regulations such as GDPR due to unauthorized data exposure, and disrupt business operations. The scope of impact extends to any organization using this plugin, including SMEs and larger enterprises, particularly those in sectors with high online engagement such as media companies, educational institutions, and digital marketing agencies. The requirement for user interaction means phishing or social engineering tactics could be used to trigger the exploit, increasing the risk to end users and administrators. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting broader site functionality.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the 'WordPress Video Robot - The Ultimate Video Importer' plugin. If found, they should upgrade to a patched version once available or temporarily disable the plugin to mitigate risk. In the absence of an official patch, applying web application firewall (WAF) rules to detect and block malicious script payloads targeting this plugin can reduce exposure. Administrators should also enforce strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Regularly educating users and administrators about phishing risks and suspicious links can reduce the likelihood of successful user interaction-based exploits. Additionally, monitoring web server and application logs for unusual requests or script injections related to the plugin can help in early detection of exploitation attempts. Finally, organizations should maintain up-to-date backups of their websites to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:22:58.198Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb42e

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 4:17:46 PM

Last updated: 7/30/2025, 4:08:03 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats