CVE-2025-4608: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codemacher Structured Content (JSON-LD) #wpsc
The Structured Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sc_fs_local_business shortcode in all versions up to, and including, 1.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-4608 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Structured Content (JSON-LD) plugin for WordPress developed by codemacher. This vulnerability affects all versions up to and including 1.6.4 of the plugin. The root cause lies in improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of user-supplied attributes in the plugin's sc_fs_local_business shortcode. An authenticated attacker with contributor-level access or higher can exploit this flaw by injecting arbitrary malicious scripts into pages via the shortcode attributes. These scripts are then stored persistently and executed in the browsers of any users who visit the compromised pages, leading to potential session hijacking, privilege escalation, or other malicious activities. The CVSS v3.1 base score is 6.4, reflecting a medium severity level. The attack vector is network-based with low attack complexity, requiring privileges equivalent to contributor-level access but no user interaction is needed for exploitation once the malicious content is injected. The vulnerability impacts confidentiality and integrity but not availability, and the scope is changed as the vulnerability affects resources beyond the attacker’s control once exploited. No public exploits are currently known in the wild, and no patches have been linked yet, indicating that mitigation may rely on plugin updates or manual code fixes once available.
Potential Impact
For European organizations using WordPress sites with the Structured Content plugin, this vulnerability poses a moderate risk. Exploitation could allow attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to theft of session cookies, user credentials, or other sensitive information. This can facilitate further attacks such as account takeover or unauthorized actions on the site. Given that contributor-level access is required, insider threats or compromised accounts pose a significant risk vector. The impact is particularly relevant for organizations that rely on WordPress for public-facing websites, e-commerce, or content management, as the injected scripts could affect visitors, customers, or employees accessing the site. Additionally, GDPR considerations apply if personal data is exposed or compromised through such attacks, potentially leading to regulatory penalties. The vulnerability does not directly affect availability but can undermine trust and integrity of web content, damaging organizational reputation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify use of the Structured Content (JSON-LD) plugin and verify the version in use. Until an official patch is released, mitigation steps include: 1) Restrict contributor-level access strictly to trusted users and review existing user roles for potential abuse. 2) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the sc_fs_local_business shortcode parameters. 3) Employ Content Security Policy (CSP) headers to limit execution of unauthorized scripts on affected sites. 4) Conduct manual code review or apply temporary input sanitization and output escaping patches if feasible. 5) Monitor website logs and user activity for signs of exploitation attempts. 6) Educate content contributors about the risks of injecting untrusted content. Once patches are available from the vendor, prioritize timely updates to the plugin. Additionally, consider isolating or disabling the shortcode if it is not essential to site functionality.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4608: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codemacher Structured Content (JSON-LD) #wpsc
Description
The Structured Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sc_fs_local_business shortcode in all versions up to, and including, 1.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-4608 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Structured Content (JSON-LD) plugin for WordPress developed by codemacher. This vulnerability affects all versions up to and including 1.6.4 of the plugin. The root cause lies in improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of user-supplied attributes in the plugin's sc_fs_local_business shortcode. An authenticated attacker with contributor-level access or higher can exploit this flaw by injecting arbitrary malicious scripts into pages via the shortcode attributes. These scripts are then stored persistently and executed in the browsers of any users who visit the compromised pages, leading to potential session hijacking, privilege escalation, or other malicious activities. The CVSS v3.1 base score is 6.4, reflecting a medium severity level. The attack vector is network-based with low attack complexity, requiring privileges equivalent to contributor-level access but no user interaction is needed for exploitation once the malicious content is injected. The vulnerability impacts confidentiality and integrity but not availability, and the scope is changed as the vulnerability affects resources beyond the attacker’s control once exploited. No public exploits are currently known in the wild, and no patches have been linked yet, indicating that mitigation may rely on plugin updates or manual code fixes once available.
Potential Impact
For European organizations using WordPress sites with the Structured Content plugin, this vulnerability poses a moderate risk. Exploitation could allow attackers to execute arbitrary JavaScript in the context of the affected website, potentially leading to theft of session cookies, user credentials, or other sensitive information. This can facilitate further attacks such as account takeover or unauthorized actions on the site. Given that contributor-level access is required, insider threats or compromised accounts pose a significant risk vector. The impact is particularly relevant for organizations that rely on WordPress for public-facing websites, e-commerce, or content management, as the injected scripts could affect visitors, customers, or employees accessing the site. Additionally, GDPR considerations apply if personal data is exposed or compromised through such attacks, potentially leading to regulatory penalties. The vulnerability does not directly affect availability but can undermine trust and integrity of web content, damaging organizational reputation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify use of the Structured Content (JSON-LD) plugin and verify the version in use. Until an official patch is released, mitigation steps include: 1) Restrict contributor-level access strictly to trusted users and review existing user roles for potential abuse. 2) Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the sc_fs_local_business shortcode parameters. 3) Employ Content Security Policy (CSP) headers to limit execution of unauthorized scripts on affected sites. 4) Conduct manual code review or apply temporary input sanitization and output escaping patches if feasible. 5) Monitor website logs and user activity for signs of exploitation attempts. 6) Educate content contributors about the risks of injecting untrusted content. Once patches are available from the vendor, prioritize timely updates to the plugin. Additionally, consider isolating or disabling the shortcode if it is not essential to site functionality.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-12T20:00:42.686Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6881fdd8ad5a09ad0033bec0
Added to database: 7/24/2025, 9:33:12 AM
Last enriched: 7/24/2025, 9:52:03 AM
Last updated: 8/18/2025, 1:22:23 AM
Views: 11
Related Threats
CVE-2025-9618: CWE-352 Cross-Site Request Forgery (CSRF) in wpdreams Related Posts Lite
MediumCVE-2025-4956: CWE-35 Path Traversal: '.../...//' in AA-Team Pro Bulk Watermark Plugin for WordPress
MediumCVE-2025-34165: CWE-121 Stack-based Buffer Overflow in NetSupport Ltd. NetSupport Manager
HighCVE-2025-34164: CWE-122 Heap-based Buffer Overflow in NetSupport Ltd. NetSupport Manager
HighCVE-2025-58159: CWE-434: Unrestricted Upload of File with Dangerous Type in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.