Skip to main content

CVE-2025-46484: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nasir179125 Image Hover Effects For WPBakery Page Builder

Medium
Published: Thu Apr 24 2025 (04/24/2025, 16:08:50 UTC)
Source: CVE
Vendor/Project: nasir179125
Product: Image Hover Effects For WPBakery Page Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nasir179125 Image Hover Effects For WPBakery Page Builder allows DOM-Based XSS. This issue affects Image Hover Effects For WPBakery Page Builder: from n/a through 2.0.

AI-Powered Analysis

AILast updated: 06/24/2025, 10:41:10 UTC

Technical Analysis

CVE-2025-46484 is a DOM-based Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the 'Image Hover Effects For WPBakery Page Builder' plugin developed by nasir179125. This vulnerability arises due to improper neutralization of user input during web page generation, allowing malicious scripts to be injected and executed in the context of the victim's browser. Specifically, the flaw exists in versions up to 2.0 of the plugin, which is used to enhance visual image hover effects within websites built on the WPBakery Page Builder platform, a popular WordPress page builder plugin. The vulnerability is DOM-based, meaning the malicious payload is executed as a result of client-side script processing of unsafe input, rather than server-side injection. This type of XSS can be triggered when a user interacts with crafted content or URLs that exploit the plugin's failure to sanitize or encode input properly before embedding it into the DOM. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites. The plugin’s integration with WordPress sites, which are widely used for content management, increases the attack surface, especially for websites that rely on this plugin for enhanced UI effects. The lack of an available patch at the time of disclosure further elevates the risk for affected installations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying on WordPress sites with the affected plugin installed. Successful exploitation could lead to unauthorized script execution in users’ browsers, resulting in theft of session cookies, credentials, or other sensitive information. This can facilitate further attacks such as account takeover or phishing campaigns targeting employees or customers. Additionally, compromised websites may suffer reputational damage, loss of customer trust, and potential regulatory penalties under GDPR if personal data is exposed or mishandled. The vulnerability primarily affects the confidentiality and integrity of user interactions with the affected websites, with a moderate impact on availability since the attack does not directly disrupt service but can degrade user trust and site functionality. Given the widespread use of WordPress in Europe across various sectors including e-commerce, media, and public services, the potential for exploitation exists, especially if organizations do not implement timely mitigations.

Mitigation Recommendations

Organizations should first identify whether their WordPress installations use the 'Image Hover Effects For WPBakery Page Builder' plugin and confirm the version in use. Since no official patch is currently available, immediate mitigations include disabling or uninstalling the plugin to eliminate the attack vector. If the plugin is essential, organizations should implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the plugin’s DOM manipulation routines. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Regularly monitoring website logs for unusual activity and educating site administrators about the risks of XSS can further reduce exposure. Organizations should also subscribe to vendor or security mailing lists to receive updates about patches or fixes. Finally, ensuring that all WordPress core components and other plugins are up to date reduces the overall attack surface and prevents chained exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-24T14:22:54.403Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf06fb

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/24/2025, 10:41:10 AM

Last updated: 8/14/2025, 7:27:16 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats