Skip to main content

CVE-2025-4594: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tournamatch Tournamatch

Medium
VulnerabilityCVE-2025-4594cvecve-2025-4594cwe-79
Published: Fri May 23 2025 (05/23/2025, 03:39:40 UTC)
Source: CVE
Vendor/Project: tournamatch
Product: Tournamatch

Description

The Tournamatch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trn-ladder-registration-button' shortcode in all versions up to, and including, 4.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/08/2025, 04:55:31 UTC

Technical Analysis

CVE-2025-4594 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Tournamatch WordPress plugin, specifically versions up to and including 4.6.1. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. The issue is located in the 'trn-ladder-registration-button' shortcode, where user-supplied attributes are insufficiently sanitized and output escaping is inadequate. This flaw allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of users. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network exploitability with low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change. The vulnerability does not currently have known exploits in the wild, and no patches have been linked yet. However, the risk remains significant for sites using this plugin, especially those with multiple contributors or public-facing content where injected scripts can affect a broad user base.

Potential Impact

For European organizations using WordPress sites with the Tournamatch plugin, this vulnerability poses a risk to confidentiality and integrity of user data and site content. Attackers with contributor-level access can inject malicious scripts that execute in the browsers of site visitors or administrators, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions within the context of the victim’s privileges. This can lead to data breaches, defacement, loss of user trust, and compliance issues under regulations such as GDPR if personal data is compromised. The scope change indicated by the CVSS score means that the vulnerability can affect components beyond the initially compromised user, amplifying the impact. Given the collaborative nature of many European organizations’ websites and the popularity of WordPress, exploitation could disrupt business operations, damage reputation, and incur remediation costs.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Tournamatch plugin and confirm the version in use. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict contributor-level access strictly to trusted users and review user roles to minimize unnecessary privileges. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'trn-ladder-registration-button' shortcode attributes. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4) Regularly monitor site content and logs for unusual script injections or modifications. 5) Consider temporarily disabling or removing the Tournamatch plugin if feasible, especially on high-risk or public-facing sites. 6) Educate site administrators and contributors about the risks of XSS and safe content practices. Once a patch is available, prioritize prompt updating of the plugin to a secure version.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-12T15:40:39.500Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ff0f10acd01a249270c95

Added to database: 5/23/2025, 3:52:17 AM

Last enriched: 7/8/2025, 4:55:31 AM

Last updated: 7/30/2025, 4:09:14 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats