CVE-2025-4970: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bannersky BSK PDF Manager
The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-4970 is a stored cross-site scripting vulnerability classified under CWE-79, found in the BSK PDF Manager plugin for WordPress. The flaw exists due to insufficient sanitization and escaping of SVG file uploads, which allows an authenticated attacker with administrator-level privileges to embed arbitrary JavaScript code within SVG files. This malicious code executes whenever any user accesses the infected SVG file, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the affected WordPress environment. The vulnerability specifically affects multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope but still posing a significant risk in complex WordPress deployments. The CVSS v3.1 score is 5.5 (medium), reflecting that the attack vector is network-based, requires high privileges (administrator), no user interaction, and impacts confidentiality and integrity with no availability impact. No public exploits have been reported yet, but the vulnerability's presence in a popular plugin used for document management in WordPress sites makes it a notable risk. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, especially those operating multi-site WordPress environments using the BSK PDF Manager plugin, this vulnerability could lead to unauthorized script execution, resulting in data leakage, session hijacking, or unauthorized administrative actions. The impact on confidentiality and integrity could compromise sensitive business information or user data. Since exploitation requires administrator privileges, insider threats or compromised admin accounts pose the greatest risk. The absence of user interaction lowers the barrier for automated exploitation once an attacker gains admin access. Given the widespread use of WordPress in Europe for corporate websites, e-commerce, and public sector portals, this vulnerability could disrupt trust and compliance with data protection regulations such as GDPR if exploited. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target plugins with known vulnerabilities. Organizations relying on multi-site WordPress setups are particularly vulnerable, as single-site installations are not affected.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the BSK PDF Manager plugin, particularly multi-site setups. Restrict SVG file uploads to trusted users only, or disable SVG uploads entirely if not essential. Implement strict input validation and output escaping for SVG files at the application level. Monitor administrator account activities for unusual behavior to detect potential exploitation attempts. Apply the principle of least privilege by limiting administrator access and ensuring strong authentication mechanisms such as MFA. Regularly update WordPress core and plugins once patches for this vulnerability become available. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious SVG payloads. Conduct security awareness training for administrators about the risks of uploading untrusted files. Finally, maintain regular backups and incident response plans tailored to WordPress environments to minimize impact if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-4970: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bannersky BSK PDF Manager
Description
The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-4970 is a stored cross-site scripting vulnerability classified under CWE-79, found in the BSK PDF Manager plugin for WordPress. The flaw exists due to insufficient sanitization and escaping of SVG file uploads, which allows an authenticated attacker with administrator-level privileges to embed arbitrary JavaScript code within SVG files. This malicious code executes whenever any user accesses the infected SVG file, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the affected WordPress environment. The vulnerability specifically affects multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the scope but still posing a significant risk in complex WordPress deployments. The CVSS v3.1 score is 5.5 (medium), reflecting that the attack vector is network-based, requires high privileges (administrator), no user interaction, and impacts confidentiality and integrity with no availability impact. No public exploits have been reported yet, but the vulnerability's presence in a popular plugin used for document management in WordPress sites makes it a notable risk. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, especially those operating multi-site WordPress environments using the BSK PDF Manager plugin, this vulnerability could lead to unauthorized script execution, resulting in data leakage, session hijacking, or unauthorized administrative actions. The impact on confidentiality and integrity could compromise sensitive business information or user data. Since exploitation requires administrator privileges, insider threats or compromised admin accounts pose the greatest risk. The absence of user interaction lowers the barrier for automated exploitation once an attacker gains admin access. Given the widespread use of WordPress in Europe for corporate websites, e-commerce, and public sector portals, this vulnerability could disrupt trust and compliance with data protection regulations such as GDPR if exploited. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target plugins with known vulnerabilities. Organizations relying on multi-site WordPress setups are particularly vulnerable, as single-site installations are not affected.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the BSK PDF Manager plugin, particularly multi-site setups. Restrict SVG file uploads to trusted users only, or disable SVG uploads entirely if not essential. Implement strict input validation and output escaping for SVG files at the application level. Monitor administrator account activities for unusual behavior to detect potential exploitation attempts. Apply the principle of least privilege by limiting administrator access and ensuring strong authentication mechanisms such as MFA. Regularly update WordPress core and plugins once patches for this vulnerability become available. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious SVG payloads. Conduct security awareness training for administrators about the risks of uploading untrusted files. Finally, maintain regular backups and incident response plans tailored to WordPress environments to minimize impact if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-19T22:06:06.068Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693bc3e35f3fdafda42e6cf0
Added to database: 12/12/2025, 7:27:31 AM
Last enriched: 12/19/2025, 8:29:40 AM
Last updated: 2/6/2026, 4:55:54 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumCVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MediumCVE-2026-2057: SQL Injection in SourceCodester Medical Center Portal Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.