CVE-2025-4594: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tournamatch Tournamatch
The Tournamatch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trn-ladder-registration-button' shortcode in all versions up to, and including, 4.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-4594 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Tournamatch WordPress plugin, specifically versions up to and including 4.6.1. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. The issue is located in the 'trn-ladder-registration-button' shortcode, where user-supplied attributes are insufficiently sanitized and output escaping is inadequate. This flaw allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of users. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network exploitability with low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change. The vulnerability does not currently have known exploits in the wild, and no patches have been linked yet. However, the risk remains significant for sites using this plugin, especially those with multiple contributors or public-facing content where injected scripts can affect a broad user base.
Potential Impact
For European organizations using WordPress sites with the Tournamatch plugin, this vulnerability poses a risk to confidentiality and integrity of user data and site content. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors or administrators, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions within the context of the victim’s privileges. This can lead to data breaches, defacement, loss of user trust, and compliance issues under regulations such as GDPR if personal data is compromised. The scope change indicated by the CVSS score means that the vulnerability can affect components beyond the initially compromised user, amplifying the impact. Given the collaborative nature of many European organizations’ websites and the popularity of WordPress, exploitation could disrupt business operations, damage reputation, and incur remediation costs.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Tournamatch plugin and confirm the version in use. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict contributor-level access strictly to trusted users and review user roles to minimize unnecessary privileges. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'trn-ladder-registration-button' shortcode attributes. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4) Regularly monitor site content and logs for unusual script injections or modifications. 5) Consider temporarily disabling or removing the Tournamatch plugin if feasible, especially on high-risk or public-facing sites. 6) Educate site administrators and contributors about the risks of XSS and safe content practices. Once a patch is available, prioritize prompt updating of the plugin to a secure version.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4594: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tournamatch Tournamatch
Description
The Tournamatch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trn-ladder-registration-button' shortcode in all versions up to, and including, 4.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-4594 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Tournamatch WordPress plugin, specifically versions up to and including 4.6.1. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. The issue is located in the 'trn-ladder-registration-button' shortcode, where user-supplied attributes are insufficiently sanitized and output escaping is inadequate. This flaw allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of users. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network exploitability with low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change. The vulnerability does not currently have known exploits in the wild, and no patches have been linked yet. However, the risk remains significant for sites using this plugin, especially those with multiple contributors or public-facing content where injected scripts can affect a broad user base.
Potential Impact
For European organizations using WordPress sites with the Tournamatch plugin, this vulnerability poses a risk to confidentiality and integrity of user data and site content. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors or administrators, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions within the context of the victim’s privileges. This can lead to data breaches, defacement, loss of user trust, and compliance issues under regulations such as GDPR if personal data is compromised. The scope change indicated by the CVSS score means that the vulnerability can affect components beyond the initially compromised user, amplifying the impact. Given the collaborative nature of many European organizations’ websites and the popularity of WordPress, exploitation could disrupt business operations, damage reputation, and incur remediation costs.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Tournamatch plugin and confirm the version in use. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict contributor-level access strictly to trusted users and review user roles to minimize unnecessary privileges. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'trn-ladder-registration-button' shortcode attributes. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4) Regularly monitor site content and logs for unusual script injections or modifications. 5) Consider temporarily disabling or removing the Tournamatch plugin if feasible, especially on high-risk or public-facing sites. 6) Educate site administrators and contributors about the risks of XSS and safe content practices. Once a patch is available, prioritize prompt updating of the plugin to a secure version.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-12T15:40:39.500Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ff0f10acd01a249270c95
Added to database: 5/23/2025, 3:52:17 AM
Last enriched: 7/8/2025, 4:55:31 AM
Last updated: 7/30/2025, 4:09:14 PM
Views: 13
Related Threats
CVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.