CVE-2025-5055: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edgarrojas Smart Forms – when you need more than just a contact form
The Smart Forms – when you need more than just a contact form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.6.98 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-5055 is a stored cross-site scripting vulnerability classified under CWE-79, affecting the WordPress plugin 'Smart Forms – when you need more than just a contact form' developed by edgarrojas. This vulnerability exists in all plugin versions up to and including 2.6.98. The root cause is insufficient sanitization of input and lack of proper output escaping in the plugin's admin settings interface. Specifically, authenticated users with administrator-level permissions or higher can inject malicious JavaScript code into the plugin's settings. This malicious code is then stored persistently and executed in the context of any user who views the affected pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability is limited to multisite WordPress installations or those where the unfiltered_html capability is disabled, which restricts the scope of affected environments. The CVSS 3.1 base score is 4.4, indicating a medium severity level, with attack vector being network, requiring high attack complexity and privileges, no user interaction, and a scope change. The impact primarily affects confidentiality and integrity, with no direct impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk especially if an attacker gains or already has admin access. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for cautious administrative controls and monitoring.
Potential Impact
The impact of CVE-2025-5055 is primarily on the confidentiality and integrity of multisite WordPress installations using the affected Smart Forms plugin. An attacker with administrator privileges can inject persistent malicious scripts that execute in the browsers of users visiting the compromised pages. This can lead to theft of session cookies, unauthorized actions performed on behalf of users, or further exploitation of the site. Although the vulnerability requires high privileges, it can be exploited by malicious insiders or attackers who have already compromised admin accounts. The scope includes multisite WordPress environments or those with unfiltered_html disabled, which are common in enterprise or managed hosting setups. The medium CVSS score reflects that while exploitation is not trivial, the consequences can be significant, especially in environments with multiple administrators or users with elevated privileges. Organizations relying on this plugin risk data leakage, unauthorized access, and potential reputational damage if the vulnerability is exploited. Since no known exploits are in the wild, the threat is currently theoretical but should be addressed proactively.
Mitigation Recommendations
To mitigate CVE-2025-5055, organizations should first verify if they are running multisite WordPress installations with the affected Smart Forms plugin version 2.6.98 or earlier. Immediate steps include restricting administrator access to trusted personnel only and auditing admin accounts for suspicious activity. Since no official patch is currently linked, consider temporarily disabling the plugin or reverting to a previous safe version if possible. Implement strict content security policies (CSP) to limit the execution of injected scripts. Enable and monitor WordPress security plugins that detect anomalous admin behavior or script injections. Regularly back up site data and configurations to enable recovery if exploitation occurs. Additionally, review and harden WordPress capabilities, especially the unfiltered_html setting, to reduce the attack surface. Monitor logs for unusual admin setting changes or unexpected script insertions. Engage with the plugin vendor or community for updates or patches and apply them promptly once available.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-5055: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edgarrojas Smart Forms – when you need more than just a contact form
Description
The Smart Forms – when you need more than just a contact form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.6.98 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5055 is a stored cross-site scripting vulnerability classified under CWE-79, affecting the WordPress plugin 'Smart Forms – when you need more than just a contact form' developed by edgarrojas. This vulnerability exists in all plugin versions up to and including 2.6.98. The root cause is insufficient sanitization of input and lack of proper output escaping in the plugin's admin settings interface. Specifically, authenticated users with administrator-level permissions or higher can inject malicious JavaScript code into the plugin's settings. This malicious code is then stored persistently and executed in the context of any user who views the affected pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability is limited to multisite WordPress installations or those where the unfiltered_html capability is disabled, which restricts the scope of affected environments. The CVSS 3.1 base score is 4.4, indicating a medium severity level, with attack vector being network, requiring high attack complexity and privileges, no user interaction, and a scope change. The impact primarily affects confidentiality and integrity, with no direct impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk especially if an attacker gains or already has admin access. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for cautious administrative controls and monitoring.
Potential Impact
The impact of CVE-2025-5055 is primarily on the confidentiality and integrity of multisite WordPress installations using the affected Smart Forms plugin. An attacker with administrator privileges can inject persistent malicious scripts that execute in the browsers of users visiting the compromised pages. This can lead to theft of session cookies, unauthorized actions performed on behalf of users, or further exploitation of the site. Although the vulnerability requires high privileges, it can be exploited by malicious insiders or attackers who have already compromised admin accounts. The scope includes multisite WordPress environments or those with unfiltered_html disabled, which are common in enterprise or managed hosting setups. The medium CVSS score reflects that while exploitation is not trivial, the consequences can be significant, especially in environments with multiple administrators or users with elevated privileges. Organizations relying on this plugin risk data leakage, unauthorized access, and potential reputational damage if the vulnerability is exploited. Since no known exploits are in the wild, the threat is currently theoretical but should be addressed proactively.
Mitigation Recommendations
To mitigate CVE-2025-5055, organizations should first verify if they are running multisite WordPress installations with the affected Smart Forms plugin version 2.6.98 or earlier. Immediate steps include restricting administrator access to trusted personnel only and auditing admin accounts for suspicious activity. Since no official patch is currently linked, consider temporarily disabling the plugin or reverting to a previous safe version if possible. Implement strict content security policies (CSP) to limit the execution of injected scripts. Enable and monitor WordPress security plugins that detect anomalous admin behavior or script injections. Regularly back up site data and configurations to enable recovery if exploitation occurs. Additionally, review and harden WordPress capabilities, especially the unfiltered_html setting, to reduce the attack surface. Monitor logs for unusual admin setting changes or unexpected script insertions. Engage with the plugin vendor or community for updates or patches and apply them promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-21T14:31:38.535Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6831346e0acd01a249277b5a
Added to database: 5/24/2025, 2:52:30 AM
Last enriched: 2/27/2026, 3:01:40 PM
Last updated: 3/24/2026, 12:10:05 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.