CVE-2025-4671: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
The Profile Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's user_meta and compare shortcodes in all versions up to, and including, 3.13.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-4671 is a stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor' developed by cozmoslabs. This vulnerability exists in all versions up to and including 3.13.8. The root cause is improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping on user-supplied attributes within the plugin's user_meta and compare shortcodes. An authenticated attacker with at least contributor-level access can exploit this flaw by injecting arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges of a contributor or higher, but no user interaction is needed for exploitation. The scope is changed, meaning the vulnerability can affect resources beyond the initially compromised component. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability falls under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with the affected plugin installed. Stored XSS can lead to theft of user credentials, session tokens, or sensitive data, undermining confidentiality and integrity. It can also facilitate further attacks such as privilege escalation or distribution of malware. Organizations in sectors like e-commerce, government, education, and healthcare that use WordPress for user registration and profile management are particularly vulnerable. The ability for attackers with contributor-level access to inject scripts means insider threats or compromised contributor accounts can be leveraged. The impact includes potential reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruption. Since the vulnerability does not affect availability directly, denial-of-service is less likely, but the scope change means other components or users can be affected beyond the initial injection point.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the 'User Profile Builder' plugin is present and verify the version. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict contributor-level and higher permissions strictly to trusted users to reduce the risk of malicious script injection. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the user_meta and compare shortcodes. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4) Regularly monitor logs and user activity for unusual behavior indicative of exploitation attempts. 5) Consider temporarily disabling or removing the plugin if it is not critical to operations. 6) Once a patch is available, prioritize prompt update and verify the fix. 7) Educate site administrators and contributors about the risks of XSS and safe content input practices. These targeted steps go beyond generic advice by focusing on access control, detection, and containment specific to this plugin's vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4671: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
Description
The Profile Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's user_meta and compare shortcodes in all versions up to, and including, 3.13.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-4671 is a stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor' developed by cozmoslabs. This vulnerability exists in all versions up to and including 3.13.8. The root cause is improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping on user-supplied attributes within the plugin's user_meta and compare shortcodes. An authenticated attacker with at least contributor-level access can exploit this flaw by injecting arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges of a contributor or higher, but no user interaction is needed for exploitation. The scope is changed, meaning the vulnerability can affect resources beyond the initially compromised component. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability falls under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with the affected plugin installed. Stored XSS can lead to theft of user credentials, session tokens, or sensitive data, undermining confidentiality and integrity. It can also facilitate further attacks such as privilege escalation or distribution of malware. Organizations in sectors like e-commerce, government, education, and healthcare that use WordPress for user registration and profile management are particularly vulnerable. The ability for attackers with contributor-level access to inject scripts means insider threats or compromised contributor accounts can be leveraged. The impact includes potential reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruption. Since the vulnerability does not affect availability directly, denial-of-service is less likely, but the scope change means other components or users can be affected beyond the initial injection point.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the 'User Profile Builder' plugin is present and verify the version. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict contributor-level and higher permissions strictly to trusted users to reduce the risk of malicious script injection. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the user_meta and compare shortcodes. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4) Regularly monitor logs and user activity for unusual behavior indicative of exploitation attempts. 5) Consider temporarily disabling or removing the plugin if it is not critical to operations. 6) Once a patch is available, prioritize prompt update and verify the fix. 7) Educate site administrators and contributors about the risks of XSS and safe content input practices. These targeted steps go beyond generic advice by focusing on access control, detection, and containment specific to this plugin's vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-13T22:36:31.867Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683ee361182aa0cae27416a0
Added to database: 6/3/2025, 11:58:25 AM
Last enriched: 7/11/2025, 7:17:46 AM
Last updated: 7/30/2025, 3:23:48 PM
Views: 12
Related Threats
CVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.