Skip to main content

CVE-2025-4589: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nackle2k10 Bon Toolkit

Medium
VulnerabilityCVE-2025-4589cvecve-2025-4589cwe-79
Published: Thu May 15 2025 (05/15/2025, 03:21:38 UTC)
Source: CVE
Vendor/Project: nackle2k10
Product: Bon Toolkit

Description

The Bon Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bt-map' shortcode in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:39:33 UTC

Technical Analysis

CVE-2025-4589 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Bon Toolkit WordPress plugin developed by nackle2k10. This vulnerability affects all versions up to and including 1.3.2. The root cause lies in improper input sanitization and insufficient output escaping of user-supplied attributes within the plugin's 'bt-map' shortcode. Specifically, authenticated users with contributor-level permissions or higher can inject arbitrary JavaScript code into pages by manipulating the shortcode attributes. Once injected, this malicious script executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of an authenticated contributor. No user interaction is needed for exploitation, and the scope is changed, indicating that the vulnerability can affect resources beyond the initially compromised component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 15, 2025, and has been enriched by CISA, indicating recognition by authoritative cybersecurity entities.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the Bon Toolkit plugin installed. Stored XSS can lead to unauthorized actions on behalf of users, data theft, and compromise of user credentials or session tokens. This can result in defacement, loss of customer trust, and potential regulatory penalties under GDPR if personal data is exposed. Since the vulnerability requires contributor-level access, insider threats or compromised contributor accounts pose a risk. Attackers could leverage this vulnerability to pivot within the organization’s web infrastructure or launch further attacks against site visitors. The medium CVSS score reflects moderate risk, but the scope change and lack of user interaction requirement increase the potential impact. Organizations with public-facing WordPress sites, especially those handling sensitive user data or e-commerce, are at higher risk.

Mitigation Recommendations

1. Immediate mitigation involves restricting contributor-level access to trusted users only and auditing existing contributor accounts for suspicious activity. 2. Disable or remove the Bon Toolkit plugin until a security patch is released. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'bt-map' shortcode parameters. 4. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. 5. Monitor web server and application logs for unusual activity related to shortcode usage. 6. Once available, promptly apply vendor patches or updates addressing this vulnerability. 7. Educate content contributors about safe input practices and the risks of injecting untrusted content. 8. Conduct regular security assessments and penetration testing focusing on WordPress plugins and user input handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-12T15:17:10.936Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec6bf

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:39:33 AM

Last updated: 7/31/2025, 11:30:38 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats