CVE-2025-5083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in milmor Amministrazione Trasparente
The Amministrazione Trasparente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-5083 is a stored cross-site scripting vulnerability classified under CWE-79 affecting the milmor Amministrazione Trasparente plugin for WordPress. This vulnerability arises due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of administrator-configured settings. It affects all versions up to and including 9.0. The flaw allows an attacker with administrator-level permissions or higher to inject arbitrary JavaScript code into pages generated by the plugin. These scripts execute in the context of users accessing the injected pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the attack surface somewhat. Exploitation does not require user interaction but does require authenticated access with high privileges, making it a threat primarily from insider attackers or compromised admin accounts. The CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N) indicates network attack vector, low complexity, high privileges required, no user interaction, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly.
Potential Impact
The primary impact of CVE-2025-5083 is the potential execution of arbitrary JavaScript code within the browsers of users accessing affected pages, which can lead to theft of session tokens, defacement, or unauthorized actions performed on behalf of users. Since exploitation requires administrator-level access, the threat is mainly from malicious insiders or attackers who have already compromised an admin account. The vulnerability affects multi-site WordPress installations or those with unfiltered_html disabled, which are common in larger organizations or agencies managing multiple sites. This can lead to partial compromise of confidentiality and integrity of user sessions and data. While availability is not impacted, the breach of trust and potential data leakage can have reputational and operational consequences. Organizations relying on this plugin for transparency or administrative functions may face regulatory scrutiny if exploited. The medium CVSS score reflects the moderate risk, but the requirement for high privileges limits the scope of exploitation to environments with weak internal controls or compromised administrators.
Mitigation Recommendations
To mitigate CVE-2025-5083, organizations should first update the milmor Amministrazione Trasparente plugin to a patched version once available. Until a patch is released, administrators should restrict access to the plugin settings strictly to trusted users and monitor for suspicious admin activity. For multi-site WordPress installations, consider isolating sites or limiting the use of the plugin where possible. Enable and enforce strict input validation and output escaping in custom code or overrides related to the plugin. Review and tighten user role permissions to minimize the number of users with administrator-level access. Implement Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting the plugin. Regularly audit logs for unusual admin actions or injected content. Educate administrators about the risks of stored XSS and the importance of secure configuration. Finally, consider deploying Content Security Policy (CSP) headers to reduce the impact of potential script injection.
Affected Countries
United States, Italy, Germany, France, United Kingdom, Canada, Australia, Netherlands, Spain, Brazil
CVE-2025-5083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in milmor Amministrazione Trasparente
Description
The Amministrazione Trasparente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5083 is a stored cross-site scripting vulnerability classified under CWE-79 affecting the milmor Amministrazione Trasparente plugin for WordPress. This vulnerability arises due to improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of administrator-configured settings. It affects all versions up to and including 9.0. The flaw allows an attacker with administrator-level permissions or higher to inject arbitrary JavaScript code into pages generated by the plugin. These scripts execute in the context of users accessing the injected pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the attack surface somewhat. Exploitation does not require user interaction but does require authenticated access with high privileges, making it a threat primarily from insider attackers or compromised admin accounts. The CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N) indicates network attack vector, low complexity, high privileges required, no user interaction, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly.
Potential Impact
The primary impact of CVE-2025-5083 is the potential execution of arbitrary JavaScript code within the browsers of users accessing affected pages, which can lead to theft of session tokens, defacement, or unauthorized actions performed on behalf of users. Since exploitation requires administrator-level access, the threat is mainly from malicious insiders or attackers who have already compromised an admin account. The vulnerability affects multi-site WordPress installations or those with unfiltered_html disabled, which are common in larger organizations or agencies managing multiple sites. This can lead to partial compromise of confidentiality and integrity of user sessions and data. While availability is not impacted, the breach of trust and potential data leakage can have reputational and operational consequences. Organizations relying on this plugin for transparency or administrative functions may face regulatory scrutiny if exploited. The medium CVSS score reflects the moderate risk, but the requirement for high privileges limits the scope of exploitation to environments with weak internal controls or compromised administrators.
Mitigation Recommendations
To mitigate CVE-2025-5083, organizations should first update the milmor Amministrazione Trasparente plugin to a patched version once available. Until a patch is released, administrators should restrict access to the plugin settings strictly to trusted users and monitor for suspicious admin activity. For multi-site WordPress installations, consider isolating sites or limiting the use of the plugin where possible. Enable and enforce strict input validation and output escaping in custom code or overrides related to the plugin. Review and tighten user role permissions to minimize the number of users with administrator-level access. Implement Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting the plugin. Regularly audit logs for unusual admin actions or injected content. Educate administrators about the risks of stored XSS and the importance of secure configuration. Finally, consider deploying Content Security Policy (CSP) headers to reduce the impact of potential script injection.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-22T08:46:01.922Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b3d06cad5a09ad00aea88a
Added to database: 8/31/2025, 4:32:44 AM
Last enriched: 2/27/2026, 3:03:37 PM
Last updated: 3/25/2026, 3:06:46 AM
Views: 136
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.