CVE-2025-47502: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Nick Mollie Forms
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nick Mollie Forms allows Stored XSS. This issue affects Mollie Forms: from n/a through 2.7.12.
AI Analysis
Technical Summary
CVE-2025-47502 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the Nick Mollie Forms plugin up to version 2.7.12. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be stored and later executed in the context of users viewing the affected forms. This stored XSS can lead to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The CVSS v3.1 score is 6.5 (medium severity) with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, indicating network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality, integrity, and availability with a scope change. The vulnerability requires an attacker to have some level of privileges (PR:L) and user interaction (UI:R), but once exploited, it can affect multiple users due to the stored nature of the XSS. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting the vulnerability is newly disclosed. Mollie Forms is a WordPress plugin used for creating forms, and improper input sanitization in form fields is the root cause. The vulnerability allows attackers to inject malicious JavaScript payloads that execute when other users or administrators view the compromised form entries or pages, potentially leading to credential theft, privilege escalation, or further compromise of the web application environment.
Potential Impact
For European organizations using the Nick Mollie Forms plugin, this vulnerability poses a significant risk to web application security and user data confidentiality. Stored XSS can lead to session hijacking, unauthorized actions on behalf of users, and potential spread of malware or phishing attacks within the organization or its customers. The compromise of administrative accounts could result in broader system control loss. Given the medium severity and requirement for some privileges and user interaction, the risk is moderate but non-negligible, especially for organizations relying on web forms for customer interaction, data collection, or internal workflows. Data privacy regulations such as GDPR increase the stakes, as exploitation could lead to unauthorized data disclosure and regulatory penalties. The vulnerability could also damage organizational reputation if exploited to deface websites or distribute malicious content. Since no patches are currently available, organizations remain exposed until mitigations or updates are applied.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to form management interfaces to trusted users only, minimizing the number of users with privileges that could be leveraged to inject malicious input. 2. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the Mollie Forms plugin. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4. Regularly audit and sanitize all user inputs manually or via additional security plugins that enforce strict input validation and output encoding. 5. Monitor logs and user activity for suspicious behavior indicative of XSS exploitation attempts. 6. Stay alert for official patches or updates from the vendor and apply them promptly once released. 7. Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within the forms. 8. Consider temporarily disabling the Mollie Forms plugin if the risk is deemed unacceptable and no immediate patch is available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
CVE-2025-47502: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Nick Mollie Forms
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nick Mollie Forms allows Stored XSS. This issue affects Mollie Forms: from n/a through 2.7.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-47502 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the Nick Mollie Forms plugin up to version 2.7.12. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be stored and later executed in the context of users viewing the affected forms. This stored XSS can lead to unauthorized actions such as session hijacking, defacement, or redirection to malicious sites. The CVSS v3.1 score is 6.5 (medium severity) with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, indicating network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality, integrity, and availability with a scope change. The vulnerability requires an attacker to have some level of privileges (PR:L) and user interaction (UI:R), but once exploited, it can affect multiple users due to the stored nature of the XSS. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting the vulnerability is newly disclosed. Mollie Forms is a WordPress plugin used for creating forms, and improper input sanitization in form fields is the root cause. The vulnerability allows attackers to inject malicious JavaScript payloads that execute when other users or administrators view the compromised form entries or pages, potentially leading to credential theft, privilege escalation, or further compromise of the web application environment.
Potential Impact
For European organizations using the Nick Mollie Forms plugin, this vulnerability poses a significant risk to web application security and user data confidentiality. Stored XSS can lead to session hijacking, unauthorized actions on behalf of users, and potential spread of malware or phishing attacks within the organization or its customers. The compromise of administrative accounts could result in broader system control loss. Given the medium severity and requirement for some privileges and user interaction, the risk is moderate but non-negligible, especially for organizations relying on web forms for customer interaction, data collection, or internal workflows. Data privacy regulations such as GDPR increase the stakes, as exploitation could lead to unauthorized data disclosure and regulatory penalties. The vulnerability could also damage organizational reputation if exploited to deface websites or distribute malicious content. Since no patches are currently available, organizations remain exposed until mitigations or updates are applied.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to form management interfaces to trusted users only, minimizing the number of users with privileges that could be leveraged to inject malicious input. 2. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the Mollie Forms plugin. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4. Regularly audit and sanitize all user inputs manually or via additional security plugins that enforce strict input validation and output encoding. 5. Monitor logs and user activity for suspicious behavior indicative of XSS exploitation attempts. 6. Stay alert for official patches or updates from the vendor and apply them promptly once released. 7. Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within the forms. 8. Consider temporarily disabling the Mollie Forms plugin if the risk is deemed unacceptable and no immediate patch is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:39:23.016Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd8404
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 5:57:17 AM
Last updated: 8/8/2025, 1:51:12 AM
Views: 10
Related Threats
CVE-2025-9000: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8993: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8992: Cross-Site Request Forgery in mtons mblog
MediumCVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.