Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4970: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bannersky BSK PDF Manager

0
Medium
VulnerabilityCVE-2025-4970cvecve-2025-4970cwe-79
Published: Fri Dec 12 2025 (12/12/2025, 07:20:34 UTC)
Source: CVE Database V5
Vendor/Project: bannersky
Product: BSK PDF Manager

Description

The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 12/12/2025, 07:28:38 UTC

Technical Analysis

CVE-2025-4970 identifies a stored Cross-Site Scripting (XSS) vulnerability in the BSK PDF Manager plugin for WordPress, present in all versions up to and including 3.7.1. The vulnerability stems from insufficient sanitization and escaping of SVG file uploads, which allows authenticated users with Administrator-level privileges or higher to embed arbitrary JavaScript code within SVG files. This malicious code executes in the context of any user accessing the SVG file, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability specifically affects WordPress multi-site installations where the 'unfiltered_html' capability is disabled, limiting the attack surface to environments with stricter content filtering. The CVSS 3.1 base score is 5.5 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change with limited confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require manual intervention or vendor updates. The vulnerability is classified under CWE-79, highlighting improper neutralization of input during web page generation.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments using WordPress multi-site configurations with the BSK PDF Manager plugin installed. Successful exploitation could allow attackers with administrative access to inject persistent malicious scripts, potentially compromising user sessions, stealing sensitive data, or manipulating site content. Although exploitation requires high privileges, the impact on confidentiality and integrity can be significant within affected sites. Given the widespread use of WordPress across Europe, especially in sectors like media, education, and government, the vulnerability could facilitate targeted attacks against high-value multi-site deployments. However, the requirement for multi-site setups and specific configuration reduces the overall exposure. Organizations failing to patch or mitigate this vulnerability risk reputational damage and potential data breaches, especially if attackers leverage the XSS to pivot to further attacks or social engineering campaigns.

Mitigation Recommendations

European organizations should first verify if they operate WordPress multi-site installations with the BSK PDF Manager plugin version 3.7.1 or earlier. Immediate mitigation includes restricting administrator access to trusted personnel only and reviewing user privileges to minimize the number of users with high-level permissions. Since no official patch is currently available, organizations should consider disabling SVG file uploads or restricting file types accepted by the plugin. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SVG content or script payloads can reduce risk. Additionally, enabling Content Security Policy (CSP) headers to restrict script execution origins can mitigate the impact of injected scripts. Regular security audits and monitoring for unusual activity related to SVG files are recommended. Organizations should monitor vendor communications for patches and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-05-19T22:06:06.068Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bc3e35f3fdafda42e6cf0

Added to database: 12/12/2025, 7:27:31 AM

Last enriched: 12/12/2025, 7:28:38 AM

Last updated: 12/12/2025, 9:57:15 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats