Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4126: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in emmanuelg EG-Series

0
Medium
VulnerabilityCVE-2025-4126cvecve-2025-4126cwe-80
Published: Thu May 15 2025 (05/15/2025, 03:21:39 UTC)
Source: CVE
Vendor/Project: emmanuelg
Product: EG-Series

Description

The EG-Series plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [series] shortcode in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes in the shortcode_title function. This makes it possible for authenticated attackers - with contributor-level access and above, on sites with the Classic Editor plugin activated - to inject arbitrary JavaScript code in the titletag attribute that will execute whenever a user access an injected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:16:15 UTC

Technical Analysis

CVE-2025-4126 is a stored Cross-Site Scripting (XSS) vulnerability identified in the EG-Series plugin for WordPress, affecting all versions up to and including 2.1.1. The root cause is insufficient input sanitization and output escaping in the shortcode_title function, particularly concerning the titletag attribute of the [series] shortcode. This flaw allows authenticated attackers with contributor-level permissions or higher to inject arbitrary JavaScript code into the titletag attribute. The vulnerability is exploitable only on WordPress sites that have the Classic Editor plugin activated, as the attack vector relies on this editor's handling of shortcodes. Once injected, the malicious script executes in the context of any user who visits the compromised page, enabling potential session hijacking, data theft, or further exploitation such as privilege escalation or defacement. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and scope changed due to impact on other components. No public exploits have been reported yet, but the vulnerability is recognized by CISA and Wordfence, indicating credible risk. The vulnerability falls under CWE-80, which relates to improper neutralization of script-related HTML tags, a common XSS category. The absence of a patch link suggests that a fix may be pending or users must apply manual mitigations. This vulnerability highlights the risk posed by insufficient input validation in WordPress plugins, especially when combined with specific editor configurations.

Potential Impact

The impact of CVE-2025-4126 is primarily on the confidentiality and integrity of WordPress sites using the EG-Series plugin with the Classic Editor enabled. An attacker with contributor-level access can inject persistent malicious JavaScript, which executes in the browsers of any visitors to the affected pages. This can lead to session hijacking, theft of sensitive user data such as cookies or credentials, unauthorized actions performed on behalf of users, and potential defacement or redirection attacks. Although availability is not directly impacted, the trustworthiness and security posture of the affected website can be severely compromised. Organizations relying on this plugin, especially those with multiple contributors or public-facing content, face increased risk of reputational damage and data breaches. The requirement for authenticated access limits the attack surface but does not eliminate risk, as contributor accounts are common in collaborative environments. The medium CVSS score reflects moderate ease of exploitation combined with significant potential impact on user data and site integrity. The lack of known exploits in the wild currently reduces immediate urgency but does not preclude future exploitation attempts, especially as details become public.

Mitigation Recommendations

To mitigate CVE-2025-4126, organizations should first verify if their WordPress sites use the EG-Series plugin up to version 2.1.1 and have the Classic Editor plugin activated. Immediate mitigation steps include: 1) Restrict contributor-level access to trusted users only, minimizing the risk of malicious input. 2) Disable or replace the Classic Editor plugin with the Gutenberg editor if feasible, as the vulnerability depends on Classic Editor's shortcode handling. 3) Implement manual input sanitization and output escaping in the shortcode_title function by customizing the plugin code or using security plugins that enforce strict content filtering. 4) Monitor site content for suspicious shortcode usage or injected scripts. 5) Regularly update the EG-Series plugin once a patch is released by the vendor. 6) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. 7) Conduct security audits and penetration testing focused on shortcode inputs and user-generated content. These measures collectively reduce the risk of exploitation until an official patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-30T07:41:32.308Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec6f1

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/27/2026, 2:16:15 PM

Last updated: 3/24/2026, 10:05:26 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses