Skip to main content

CVE-2025-5235: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in opensheetmusicdisplay OpenSheetMusicDisplay

Medium
VulnerabilityCVE-2025-5235cvecve-2025-5235cwe-79
Published: Fri May 30 2025 (05/30/2025, 09:22:07 UTC)
Source: CVE Database V5
Vendor/Project: opensheetmusicdisplay
Product: OpenSheetMusicDisplay

Description

The OpenSheetMusicDisplay plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘className’ parameter in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/07/2025, 21:40:59 UTC

Technical Analysis

CVE-2025-5235 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the OpenSheetMusicDisplay plugin for WordPress, affecting all versions up to and including 1.4.0. The vulnerability arises from improper neutralization of input during web page generation, specifically via the 'className' parameter. Due to insufficient input sanitization and lack of proper output escaping, authenticated users with Contributor-level access or higher can inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of authenticated Contributor or above, but does not require user interaction for exploitation. The scope is changed, meaning the vulnerability can affect components beyond the initially vulnerable plugin, potentially impacting the confidentiality and integrity of user data and site content. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS attacks.

Potential Impact

For European organizations using WordPress sites with the OpenSheetMusicDisplay plugin, this vulnerability poses a significant risk to website integrity and user trust. Exploitation could allow attackers to execute malicious scripts that steal session cookies, deface content, or redirect visitors to phishing or malware sites. This can lead to data breaches, reputational damage, and potential regulatory non-compliance under GDPR if personal data is compromised. Since the attack requires authenticated Contributor-level access, insider threats or compromised accounts pose a realistic risk vector. The vulnerability's ability to affect multiple users and potentially escalate impact across site components increases the threat surface. Organizations relying on WordPress for public-facing or internal portals that include this plugin are at risk of persistent XSS attacks that can undermine website security and user privacy.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the OpenSheetMusicDisplay plugin and verify the version in use. Until an official patch is released, administrators should restrict Contributor-level access to trusted users only and consider temporarily disabling or removing the plugin if feasible. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious script injections targeting the 'className' parameter can provide interim protection. Additionally, applying Content Security Policy (CSP) headers to restrict script execution sources can mitigate the impact of injected scripts. Regularly monitoring logs for unusual activity related to page content changes or script injections is recommended. Once a patch is available, prompt updating of the plugin is critical. Educating content contributors about the risks and enforcing strong authentication measures (e.g., MFA) will reduce the likelihood of account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-26T21:38:12.002Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68397e09182aa0cae2a8d42c

Added to database: 5/30/2025, 9:44:41 AM

Last enriched: 7/7/2025, 9:40:59 PM

Last updated: 7/30/2025, 5:16:37 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats