CVE-2025-4652: CWE-79 Cross-Site Scripting (XSS) in Broadstreet
The Broadstreet WordPress plugin before 1.51.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
AI Analysis
Technical Summary
CVE-2025-4652 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Broadstreet WordPress plugin versions prior to 1.51.8. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input parameters before reflecting them back in the web page output. This improper handling of input allows an attacker to inject malicious scripts into the web page that are then executed in the context of the victim's browser. Since the vulnerability is reflected, it requires the victim to click on a crafted link or visit a malicious URL containing the payload. The vulnerability specifically threatens high privilege users such as administrators, which increases the potential impact. Exploiting this vulnerability could allow attackers to steal session cookies, perform actions on behalf of the admin user, or deliver further malware payloads. The CVSS 3.1 base score of 6.1 (medium severity) reflects that the attack vector is network-based, requires no privileges, but does require user interaction, and impacts confidentiality and integrity with a scope change. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet, although the fixed version is 1.51.8 or later. The vulnerability is categorized under CWE-79, which is a common and well-understood class of web application security issues related to improper input validation and output encoding.
Potential Impact
For European organizations using the Broadstreet WordPress plugin, this vulnerability poses a moderate risk primarily to website administrators and content managers. Successful exploitation could lead to unauthorized access to admin sessions, enabling attackers to modify website content, inject malicious code, or steal sensitive information. This can damage organizational reputation, lead to data breaches, and potentially facilitate further attacks such as phishing or malware distribution. Given that WordPress is widely used across Europe for corporate, governmental, and media websites, the impact could be significant if exploited on high-profile or critical infrastructure sites. The reflected nature of the XSS means that targeted spear-phishing campaigns could be used to trick privileged users into executing the attack. However, the lack of known active exploitation and the medium severity rating suggest the threat is currently moderate but should be addressed promptly to prevent escalation.
Mitigation Recommendations
European organizations should immediately verify their use of the Broadstreet WordPress plugin and upgrade to version 1.51.8 or later where the vulnerability is fixed. Until patching is possible, organizations should implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns that could trigger XSS payloads. Administrators should be trained to recognize phishing attempts that might exploit this vulnerability. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact by restricting the execution of unauthorized scripts. Regular security audits and scanning for reflected XSS vulnerabilities on public-facing web assets should be conducted. Finally, limiting admin access to trusted networks and enforcing multi-factor authentication can reduce the risk of session hijacking if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4652: CWE-79 Cross-Site Scripting (XSS) in Broadstreet
Description
The Broadstreet WordPress plugin before 1.51.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
AI-Powered Analysis
Technical Analysis
CVE-2025-4652 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Broadstreet WordPress plugin versions prior to 1.51.8. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input parameters before reflecting them back in the web page output. This improper handling of input allows an attacker to inject malicious scripts into the web page that are then executed in the context of the victim's browser. Since the vulnerability is reflected, it requires the victim to click on a crafted link or visit a malicious URL containing the payload. The vulnerability specifically threatens high privilege users such as administrators, which increases the potential impact. Exploiting this vulnerability could allow attackers to steal session cookies, perform actions on behalf of the admin user, or deliver further malware payloads. The CVSS 3.1 base score of 6.1 (medium severity) reflects that the attack vector is network-based, requires no privileges, but does require user interaction, and impacts confidentiality and integrity with a scope change. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet, although the fixed version is 1.51.8 or later. The vulnerability is categorized under CWE-79, which is a common and well-understood class of web application security issues related to improper input validation and output encoding.
Potential Impact
For European organizations using the Broadstreet WordPress plugin, this vulnerability poses a moderate risk primarily to website administrators and content managers. Successful exploitation could lead to unauthorized access to admin sessions, enabling attackers to modify website content, inject malicious code, or steal sensitive information. This can damage organizational reputation, lead to data breaches, and potentially facilitate further attacks such as phishing or malware distribution. Given that WordPress is widely used across Europe for corporate, governmental, and media websites, the impact could be significant if exploited on high-profile or critical infrastructure sites. The reflected nature of the XSS means that targeted spear-phishing campaigns could be used to trick privileged users into executing the attack. However, the lack of known active exploitation and the medium severity rating suggest the threat is currently moderate but should be addressed promptly to prevent escalation.
Mitigation Recommendations
European organizations should immediately verify their use of the Broadstreet WordPress plugin and upgrade to version 1.51.8 or later where the vulnerability is fixed. Until patching is possible, organizations should implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns that could trigger XSS payloads. Administrators should be trained to recognize phishing attempts that might exploit this vulnerability. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact by restricting the execution of unauthorized scripts. Regular security audits and scanning for reflected XSS vulnerabilities on public-facing web assets should be conducted. Finally, limiting admin access to trusted networks and enforcing multi-factor authentication can reduce the risk of session hijacking if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-05-13T12:58:18.602Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6846c60d7b622a9fdf1e7927
Added to database: 6/9/2025, 11:31:25 AM
Last enriched: 7/9/2025, 11:41:28 AM
Last updated: 8/11/2025, 11:10:08 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.