CVE-2025-50005: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tagDiv tagDiv Composer
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer td-composer allows DOM-Based XSS.This issue affects tagDiv Composer: from n/a through <= 5.4.2.
AI Analysis
Technical Summary
CVE-2025-50005 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in the tagDiv Composer plugin, a popular WordPress page builder used primarily for creating and managing web content. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious actors to inject arbitrary JavaScript code that executes within the victim's browser context. Specifically, the flaw exists in versions up to and including 5.4.2 of tagDiv Composer. Because this is a DOM-based XSS, the attack payload is executed on the client side without involving server-side script injection, making detection and mitigation more challenging. The vulnerability requires no authentication but does require user interaction, such as clicking a crafted link or visiting a maliciously crafted page. The CVSS 3.1 base score is 6.1, reflecting medium severity, with attack vector being network (remote), low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, such as theft of cookies, session tokens, or manipulation of the DOM to mislead users. No known exploits have been reported in the wild yet, but the presence of this vulnerability in a widely used WordPress plugin makes it a significant concern for web administrators. The lack of available patches at the time of reporting necessitates proactive mitigation steps.
Potential Impact
For European organizations, especially those relying on WordPress with the tagDiv Composer plugin for content management, this vulnerability poses risks of client-side attacks that can lead to session hijacking, unauthorized actions performed on behalf of users, and potential defacement or misinformation through manipulated page content. Media, publishing, and e-commerce sectors are particularly vulnerable due to their reliance on dynamic content and user interactions. The exploitation could result in reputational damage, loss of user trust, and potential regulatory consequences under GDPR if personal data is compromised. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure victims into triggering the exploit. The medium severity indicates that while the vulnerability is not critical, it still represents a meaningful threat that could be leveraged as part of a broader attack chain targeting European digital assets.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the use of tagDiv Composer and verify the plugin version. Until an official patch is released, administrators should consider disabling or restricting access to the plugin, especially on publicly accessible sites. Implementing strict Content Security Policies (CSP) can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded and executed. Web Application Firewalls (WAFs) should be configured to detect and block suspicious input patterns associated with XSS payloads targeting tagDiv Composer. Educating users to avoid clicking on suspicious links and employing browser security features like script blockers can reduce the risk of exploitation. Once a patch is available, prompt application of updates is critical. Additionally, reviewing and sanitizing all user inputs and outputs in custom code interacting with tagDiv Composer can prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-50005: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tagDiv tagDiv Composer
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer td-composer allows DOM-Based XSS.This issue affects tagDiv Composer: from n/a through <= 5.4.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-50005 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in the tagDiv Composer plugin, a popular WordPress page builder used primarily for creating and managing web content. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious actors to inject arbitrary JavaScript code that executes within the victim's browser context. Specifically, the flaw exists in versions up to and including 5.4.2 of tagDiv Composer. Because this is a DOM-based XSS, the attack payload is executed on the client side without involving server-side script injection, making detection and mitigation more challenging. The vulnerability requires no authentication but does require user interaction, such as clicking a crafted link or visiting a maliciously crafted page. The CVSS 3.1 base score is 6.1, reflecting medium severity, with attack vector being network (remote), low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, such as theft of cookies, session tokens, or manipulation of the DOM to mislead users. No known exploits have been reported in the wild yet, but the presence of this vulnerability in a widely used WordPress plugin makes it a significant concern for web administrators. The lack of available patches at the time of reporting necessitates proactive mitigation steps.
Potential Impact
For European organizations, especially those relying on WordPress with the tagDiv Composer plugin for content management, this vulnerability poses risks of client-side attacks that can lead to session hijacking, unauthorized actions performed on behalf of users, and potential defacement or misinformation through manipulated page content. Media, publishing, and e-commerce sectors are particularly vulnerable due to their reliance on dynamic content and user interactions. The exploitation could result in reputational damage, loss of user trust, and potential regulatory consequences under GDPR if personal data is compromised. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure victims into triggering the exploit. The medium severity indicates that while the vulnerability is not critical, it still represents a meaningful threat that could be leveraged as part of a broader attack chain targeting European digital assets.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the use of tagDiv Composer and verify the plugin version. Until an official patch is released, administrators should consider disabling or restricting access to the plugin, especially on publicly accessible sites. Implementing strict Content Security Policies (CSP) can help mitigate the impact of injected scripts by restricting the sources from which scripts can be loaded and executed. Web Application Firewalls (WAFs) should be configured to detect and block suspicious input patterns associated with XSS payloads targeting tagDiv Composer. Educating users to avoid clicking on suspicious links and employing browser security features like script blockers can reduce the risk of exploitation. Once a patch is available, prompt application of updates is critical. Additionally, reviewing and sanitizing all user inputs and outputs in custom code interacting with tagDiv Composer can prevent similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-11T16:08:11.572Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6972590f4623b1157c7faace
Added to database: 1/22/2026, 5:06:23 PM
Last enriched: 1/30/2026, 9:32:51 AM
Last updated: 2/6/2026, 2:44:39 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2056: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.