CVE-2025-4970: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bannersky BSK PDF Manager
The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-4970 identifies a stored Cross-Site Scripting (XSS) vulnerability in the BSK PDF Manager plugin for WordPress, present in all versions up to and including 3.7.1. The vulnerability stems from insufficient sanitization and escaping of SVG file uploads, which allows authenticated users with Administrator-level privileges or higher to embed arbitrary JavaScript code within SVG files. This malicious code executes in the context of any user accessing the SVG file, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability specifically affects WordPress multi-site installations where the 'unfiltered_html' capability is disabled, limiting the attack surface to environments with stricter content filtering. The CVSS 3.1 base score is 5.5 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change with limited confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require manual intervention or vendor updates. The vulnerability is classified under CWE-79, highlighting improper neutralization of input during web page generation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments using WordPress multi-site configurations with the BSK PDF Manager plugin installed. Successful exploitation could allow attackers with administrative access to inject persistent malicious scripts, potentially compromising user sessions, stealing sensitive data, or manipulating site content. Although exploitation requires high privileges, the impact on confidentiality and integrity can be significant within affected sites. Given the widespread use of WordPress across Europe, especially in sectors like media, education, and government, the vulnerability could facilitate targeted attacks against high-value multi-site deployments. However, the requirement for multi-site setups and specific configuration reduces the overall exposure. Organizations failing to patch or mitigate this vulnerability risk reputational damage and potential data breaches, especially if attackers leverage the XSS to pivot to further attacks or social engineering campaigns.
Mitigation Recommendations
European organizations should first verify if they operate WordPress multi-site installations with the BSK PDF Manager plugin version 3.7.1 or earlier. Immediate mitigation includes restricting administrator access to trusted personnel only and reviewing user privileges to minimize the number of users with high-level permissions. Since no official patch is currently available, organizations should consider disabling SVG file uploads or restricting file types accepted by the plugin. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SVG content or script payloads can reduce risk. Additionally, enabling Content Security Policy (CSP) headers to restrict script execution origins can mitigate the impact of injected scripts. Regular security audits and monitoring for unusual activity related to SVG files are recommended. Organizations should monitor vendor communications for patches and apply updates promptly once available.
Affected Countries
Germany, United Kingdom, France, Italy, Netherlands, Spain, Poland
CVE-2025-4970: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bannersky BSK PDF Manager
Description
The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-4970 identifies a stored Cross-Site Scripting (XSS) vulnerability in the BSK PDF Manager plugin for WordPress, present in all versions up to and including 3.7.1. The vulnerability stems from insufficient sanitization and escaping of SVG file uploads, which allows authenticated users with Administrator-level privileges or higher to embed arbitrary JavaScript code within SVG files. This malicious code executes in the context of any user accessing the SVG file, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability specifically affects WordPress multi-site installations where the 'unfiltered_html' capability is disabled, limiting the attack surface to environments with stricter content filtering. The CVSS 3.1 base score is 5.5 (medium), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change with limited confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require manual intervention or vendor updates. The vulnerability is classified under CWE-79, highlighting improper neutralization of input during web page generation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments using WordPress multi-site configurations with the BSK PDF Manager plugin installed. Successful exploitation could allow attackers with administrative access to inject persistent malicious scripts, potentially compromising user sessions, stealing sensitive data, or manipulating site content. Although exploitation requires high privileges, the impact on confidentiality and integrity can be significant within affected sites. Given the widespread use of WordPress across Europe, especially in sectors like media, education, and government, the vulnerability could facilitate targeted attacks against high-value multi-site deployments. However, the requirement for multi-site setups and specific configuration reduces the overall exposure. Organizations failing to patch or mitigate this vulnerability risk reputational damage and potential data breaches, especially if attackers leverage the XSS to pivot to further attacks or social engineering campaigns.
Mitigation Recommendations
European organizations should first verify if they operate WordPress multi-site installations with the BSK PDF Manager plugin version 3.7.1 or earlier. Immediate mitigation includes restricting administrator access to trusted personnel only and reviewing user privileges to minimize the number of users with high-level permissions. Since no official patch is currently available, organizations should consider disabling SVG file uploads or restricting file types accepted by the plugin. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SVG content or script payloads can reduce risk. Additionally, enabling Content Security Policy (CSP) headers to restrict script execution origins can mitigate the impact of injected scripts. Regular security audits and monitoring for unusual activity related to SVG files are recommended. Organizations should monitor vendor communications for patches and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-19T22:06:06.068Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693bc3e35f3fdafda42e6cf0
Added to database: 12/12/2025, 7:27:31 AM
Last enriched: 12/12/2025, 7:28:38 AM
Last updated: 12/12/2025, 9:57:15 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-40829: CWE-908: Use of Uninitialized Resource in Siemens Simcenter Femap
HighCVE-2025-58137: CWE-639 Authorization Bypass Through User-Controlled Key in Apache Software Foundation Apache Fineract
HighCVE-2025-58130: CWE-522 Insufficiently Protected Credentials in Apache Software Foundation Apache Fineract
HighCVE-2025-26866: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache HugeGraph-Server
HighCVE-2025-23408: CWE-521 Weak Password Requirements in Apache Software Foundation Apache Fineract
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.