CVE-2025-5237: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sovica Target Video Easy Publish
The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width’ parameter in all versions up to, and including, 3.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-5237 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Target Video Easy Publish plugin for WordPress, developed by sovica. This vulnerability affects all versions up to and including 3.8.5. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of the 'width' parameter. An authenticated attacker with Contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. Because the vulnerability is stored, the malicious script persists in the affected pages and executes whenever any user accesses those pages, potentially including administrators or other privileged users. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (Contributor or above), no user interaction, and a scope change. The impact includes limited confidentiality and integrity loss, as the attacker can execute scripts in the context of the affected site, potentially stealing session tokens, performing actions on behalf of users, or defacing content. Availability is not impacted. No known exploits are currently reported in the wild, and no patches have been published yet. This vulnerability is categorized under CWE-79, a common and well-understood web application security issue. The vulnerability requires authenticated access, which somewhat limits the attack surface but remains significant given that Contributor-level access is commonly granted in many WordPress deployments. The scope change indicates that the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site context when exploited.
Potential Impact
For European organizations using WordPress sites with the Target Video Easy Publish plugin, this vulnerability poses a moderate risk. Attackers with Contributor-level access can inject persistent malicious scripts, leading to session hijacking, unauthorized actions, or defacement. This can damage organizational reputation, lead to data leakage of user information, and facilitate further attacks such as privilege escalation or lateral movement within the web application. Sectors with high reliance on WordPress for public-facing or internal portals—such as media, education, government, and SMEs—may face increased exposure. The lack of availability impact reduces the risk of service disruption but does not mitigate the confidentiality and integrity concerns. Since Contributor-level access is required, organizations with lax user privilege management or weak internal controls are at higher risk. Additionally, the stored nature of the XSS means that any user visiting the infected pages could be compromised, amplifying the potential damage. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting Contributor-level access strictly to trusted users and reviewing user roles and permissions to minimize unnecessary privileges. 2. Implement Web Application Firewall (WAF) rules that detect and block suspicious input patterns in the 'width' parameter or other plugin-specific parameters. 3. Monitor logs for unusual activity related to the plugin or unexpected script injections. 4. Until an official patch is released, consider disabling or removing the Target Video Easy Publish plugin if feasible, especially on high-value or public-facing sites. 5. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS vulnerabilities. 6. Educate site administrators and contributors about the risks of injecting untrusted content and the importance of input validation. 7. Once a patch is available, prioritize timely application of updates. 8. Conduct regular security audits and penetration testing focusing on plugin vulnerabilities and privilege escalation paths. These steps go beyond generic advice by focusing on role-based access control, WAF tuning specific to the vulnerable parameter, and leveraging CSP as a compensating control.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-5237: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sovica Target Video Easy Publish
Description
The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width’ parameter in all versions up to, and including, 3.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-5237 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Target Video Easy Publish plugin for WordPress, developed by sovica. This vulnerability affects all versions up to and including 3.8.5. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and output escaping of the 'width' parameter. An authenticated attacker with Contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. Because the vulnerability is stored, the malicious script persists in the affected pages and executes whenever any user accesses those pages, potentially including administrators or other privileged users. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (Contributor or above), no user interaction, and a scope change. The impact includes limited confidentiality and integrity loss, as the attacker can execute scripts in the context of the affected site, potentially stealing session tokens, performing actions on behalf of users, or defacing content. Availability is not impacted. No known exploits are currently reported in the wild, and no patches have been published yet. This vulnerability is categorized under CWE-79, a common and well-understood web application security issue. The vulnerability requires authenticated access, which somewhat limits the attack surface but remains significant given that Contributor-level access is commonly granted in many WordPress deployments. The scope change indicates that the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site context when exploited.
Potential Impact
For European organizations using WordPress sites with the Target Video Easy Publish plugin, this vulnerability poses a moderate risk. Attackers with Contributor-level access can inject persistent malicious scripts, leading to session hijacking, unauthorized actions, or defacement. This can damage organizational reputation, lead to data leakage of user information, and facilitate further attacks such as privilege escalation or lateral movement within the web application. Sectors with high reliance on WordPress for public-facing or internal portals—such as media, education, government, and SMEs—may face increased exposure. The lack of availability impact reduces the risk of service disruption but does not mitigate the confidentiality and integrity concerns. Since Contributor-level access is required, organizations with lax user privilege management or weak internal controls are at higher risk. Additionally, the stored nature of the XSS means that any user visiting the infected pages could be compromised, amplifying the potential damage. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting Contributor-level access strictly to trusted users and reviewing user roles and permissions to minimize unnecessary privileges. 2. Implement Web Application Firewall (WAF) rules that detect and block suspicious input patterns in the 'width' parameter or other plugin-specific parameters. 3. Monitor logs for unusual activity related to the plugin or unexpected script injections. 4. Until an official patch is released, consider disabling or removing the Target Video Easy Publish plugin if feasible, especially on high-value or public-facing sites. 5. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS vulnerabilities. 6. Educate site administrators and contributors about the risks of injecting untrusted content and the importance of input validation. 7. Once a patch is available, prioritize timely application of updates. 8. Conduct regular security audits and penetration testing focusing on plugin vulnerabilities and privilege escalation paths. These steps go beyond generic advice by focusing on role-based access control, WAF tuning specific to the vulnerable parameter, and leveraging CSP as a compensating control.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-26T22:04:51.103Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6852882da8c921274387fa37
Added to database: 6/18/2025, 9:34:37 AM
Last enriched: 6/18/2025, 9:49:43 AM
Last updated: 8/3/2025, 2:30:57 PM
Views: 15
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.