CVE-2025-5083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in milmor Amministrazione Trasparente
The Amministrazione Trasparente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-5083 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the Amministrazione Trasparente WordPress plugin developed by milmor. This vulnerability exists in all versions up to and including version 9.0. The root cause is improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping in the plugin's admin settings. The vulnerability allows an authenticated attacker with administrator-level permissions or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page. Notably, this vulnerability only affects WordPress multi-site installations or installations where the unfiltered_html capability has been disabled, limiting the scope somewhat. The CVSS 3.1 base score is 5.5 (medium), reflecting that the attack vector is network-based, requires high privileges (administrator), no user interaction is needed, and the impact is limited to low confidentiality and integrity loss without availability impact. The vulnerability’s scope is changed (S:C) because the injected scripts can affect other users beyond the attacker. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-79, indicating improper neutralization of input leading to XSS. This vulnerability could allow attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, depending on the injected payload. However, exploitation requires administrative access, which limits the risk to environments where such access is compromised or insider threats exist.
Potential Impact
For European organizations using WordPress multi-site installations with the Amministrazione Trasparente plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise the confidentiality and integrity of user data. Since the plugin is designed for transparency administration, often used by public sector or governmental entities in Italy and potentially other European countries, the impact could extend to sensitive administrative data or public-facing transparency portals. Attackers with admin access could inject malicious scripts that execute in the browsers of other administrators or users, potentially leading to session hijacking, unauthorized actions, or misinformation dissemination. The requirement for administrator-level privileges reduces the likelihood of external attackers exploiting this vulnerability directly but raises concerns about insider threats or compromised admin accounts. The multi-site limitation means organizations running single-site WordPress instances are not affected, but large organizations or municipalities using multi-site setups are at risk. The vulnerability could undermine trust in public transparency platforms and lead to reputational damage, especially in countries with strict data protection regulations like GDPR. Additionally, the cross-site scripting could be leveraged as a stepping stone for further attacks within the affected network.
Mitigation Recommendations
1. Immediate mitigation should include restricting administrator access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Organizations should audit their WordPress installations to identify if they use multi-site configurations with the Amministrazione Trasparente plugin and verify if unfiltered_html is disabled. 3. Until an official patch is released, administrators can implement manual input sanitization and output escaping in the plugin’s admin settings if feasible, or disable the plugin temporarily in multi-site environments. 4. Monitor administrative activity logs for suspicious behavior indicative of attempted exploitation or unauthorized script injections. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the affected sites. 6. Regularly update WordPress core and plugins to the latest versions once patches become available. 7. Conduct security awareness training for administrators to recognize and prevent social engineering attacks that could lead to credential compromise. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the plugin’s admin pages.
Affected Countries
Italy, Germany, France, Spain, United Kingdom, Netherlands, Belgium
CVE-2025-5083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in milmor Amministrazione Trasparente
Description
The Amministrazione Trasparente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-5083 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the Amministrazione Trasparente WordPress plugin developed by milmor. This vulnerability exists in all versions up to and including version 9.0. The root cause is improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping in the plugin's admin settings. The vulnerability allows an authenticated attacker with administrator-level permissions or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page. Notably, this vulnerability only affects WordPress multi-site installations or installations where the unfiltered_html capability has been disabled, limiting the scope somewhat. The CVSS 3.1 base score is 5.5 (medium), reflecting that the attack vector is network-based, requires high privileges (administrator), no user interaction is needed, and the impact is limited to low confidentiality and integrity loss without availability impact. The vulnerability’s scope is changed (S:C) because the injected scripts can affect other users beyond the attacker. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-79, indicating improper neutralization of input leading to XSS. This vulnerability could allow attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites, depending on the injected payload. However, exploitation requires administrative access, which limits the risk to environments where such access is compromised or insider threats exist.
Potential Impact
For European organizations using WordPress multi-site installations with the Amministrazione Trasparente plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise the confidentiality and integrity of user data. Since the plugin is designed for transparency administration, often used by public sector or governmental entities in Italy and potentially other European countries, the impact could extend to sensitive administrative data or public-facing transparency portals. Attackers with admin access could inject malicious scripts that execute in the browsers of other administrators or users, potentially leading to session hijacking, unauthorized actions, or misinformation dissemination. The requirement for administrator-level privileges reduces the likelihood of external attackers exploiting this vulnerability directly but raises concerns about insider threats or compromised admin accounts. The multi-site limitation means organizations running single-site WordPress instances are not affected, but large organizations or municipalities using multi-site setups are at risk. The vulnerability could undermine trust in public transparency platforms and lead to reputational damage, especially in countries with strict data protection regulations like GDPR. Additionally, the cross-site scripting could be leveraged as a stepping stone for further attacks within the affected network.
Mitigation Recommendations
1. Immediate mitigation should include restricting administrator access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Organizations should audit their WordPress installations to identify if they use multi-site configurations with the Amministrazione Trasparente plugin and verify if unfiltered_html is disabled. 3. Until an official patch is released, administrators can implement manual input sanitization and output escaping in the plugin’s admin settings if feasible, or disable the plugin temporarily in multi-site environments. 4. Monitor administrative activity logs for suspicious behavior indicative of attempted exploitation or unauthorized script injections. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the affected sites. 6. Regularly update WordPress core and plugins to the latest versions once patches become available. 7. Conduct security awareness training for administrators to recognize and prevent social engineering attacks that could lead to credential compromise. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the plugin’s admin pages.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-22T08:46:01.922Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b3d06cad5a09ad00aea88a
Added to database: 8/31/2025, 4:32:44 AM
Last enriched: 8/31/2025, 4:47:46 AM
Last updated: 9/1/2025, 9:56:10 AM
Views: 17
Related Threats
CVE-2025-9778: Hard-coded Credentials in Tenda W12
LowCVE-2025-36133: CWE-532 Insertion of Sensitive Information into Log File in IBM App Connect Enterprise Certified Container
MediumCVE-2025-9775: Unrestricted Upload in RemoteClinic
MediumCVE-2025-9774: Information Disclosure in RemoteClinic
MediumCVE-2025-9773: Cross Site Scripting in RemoteClinic
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.