Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50005: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tagDiv tagDiv Composer

0
Medium
VulnerabilityCVE-2025-50005cvecve-2025-50005
Published: Thu Jan 22 2026 (01/22/2026, 16:51:44 UTC)
Source: CVE Database V5
Vendor/Project: tagDiv
Product: tagDiv Composer

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer td-composer allows DOM-Based XSS.This issue affects tagDiv Composer: from n/a through <= 5.4.2.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:32:51 UTC

Technical Analysis

CVE-2025-50005 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in the tagDiv Composer plugin, a popular WordPress page builder used primarily for creating and managing web content. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious actors to inject arbitrary JavaScript code that executes within the victim's browser context. Specifically, the flaw exists in versions up to and including 5.4.2 of tagDiv Composer. Because this is a DOM-based XSS, the attack payload is executed on the client side without involving server-side script injection, making detection and mitigation more challenging. The vulnerability requires no authentication but does require user interaction, such as clicking a crafted link or visiting a maliciously crafted page. The CVSS 3.1 base score is 6.1, reflecting medium severity, with attack vector being network (remote), low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, such as theft of cookies, session tokens, or manipulation of the DOM to mislead users. No known exploits have been reported in the wild yet, but the presence of this vulnerability in a widely used WordPress plugin makes it a significant concern for web administrators. The lack of available patches at the time of reporting necessitates proactive mitigation steps.

Potential Impact

For European organizations, especially those relying on WordPress with the tagDiv Composer plugin for content management, this vulnerability poses risks of client-side attacks that can lead to session hijacking, unauthorized actions performed on behalf of users, and potential defacement or misinformation through manipulated page content. Media, publishing, and e-commerce sectors are particularly vulnerable due to their reliance on dynamic content and user interactions. The exploitation could result in reputational damage, loss of user trust, and potential regulatory consequences under GDPR if personal data is compromised. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure victims into triggering the exploit. The medium severity indicates that while the vulnerability is not critical, it still represents a meaningful threat that could be leveraged as part of a broader attack chain targeting European digital assets.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify the use of tagDiv Composer and verify the plugin version. Until an official patch is released, administrators should consider disabling or restricting access to the plugin, especially on publicly accessible sites. Implementing strict Content Security Policies (CSP) can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded and executed. Web Application Firewalls (WAFs) should be configured to detect and block suspicious input patterns associated with XSS payloads targeting tagDiv Composer. Educating users to avoid clicking on suspicious links and employing browser security features like script blockers can reduce the risk of exploitation. Once a patch is available, prompt application of updates is critical. Additionally, reviewing and sanitizing all user inputs and outputs in custom code interacting with tagDiv Composer can prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:08:11.572Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6972590f4623b1157c7faace

Added to database: 1/22/2026, 5:06:23 PM

Last enriched: 1/30/2026, 9:32:51 AM

Last updated: 2/6/2026, 2:44:39 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats