Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54718: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NooTheme Yogi - Health Beauty & Yoga

0
High
VulnerabilityCVE-2025-54718cvecve-2025-54718
Published: Thu Nov 06 2025 (11/06/2025, 15:54:14 UTC)
Source: CVE Database V5
Vendor/Project: NooTheme
Product: Yogi - Health Beauty & Yoga

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NooTheme Yogi - Health Beauty & Yoga noo-yogi allows Reflected XSS.This issue affects Yogi - Health Beauty & Yoga: from n/a through <= 2.9.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:51:11 UTC

Technical Analysis

CVE-2025-54718 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the NooTheme Yogi - Health Beauty & Yoga WordPress theme, versions up to and including 2.9.2. The vulnerability stems from improper neutralization of user-supplied input during the dynamic generation of web pages, allowing attackers to inject malicious JavaScript code that is reflected back to users without adequate sanitization or encoding. This flaw enables an attacker to craft a malicious URL or input that, when visited or submitted by a victim, executes arbitrary scripts within the victim's browser context. The vulnerability does not require any authentication or privileges to exploit but does require user interaction, such as clicking a malicious link or submitting crafted input. The CVSS v3.1 base score of 7.1 reflects a high severity, with attack vector being network (remote), low attack complexity, no privileges required, user interaction required, and scope changed, impacting confidentiality, integrity, and availability to a limited extent. Potential impacts include theft of session cookies, defacement of web content, phishing attacks, or redirecting users to malicious sites. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to websites using this theme, especially those handling sensitive user data or financial transactions. The lack of available patches at the time of publication necessitates immediate mitigation efforts. Given the theme's focus on health, beauty, and yoga sectors, websites in these industries are particularly at risk. The reflected nature of the XSS means the attack payload is not stored on the server but delivered via crafted requests, making detection and prevention critical. The vulnerability was reserved in July 2025 and published in November 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially those operating websites in the health, beauty, and wellness sectors using the NooTheme Yogi theme, this vulnerability can lead to significant reputational damage and data breaches. Attackers exploiting this XSS flaw can hijack user sessions, steal sensitive personal information, or manipulate website content, undermining user trust and potentially violating GDPR requirements concerning data protection. The reflected XSS can also facilitate phishing campaigns targeting customers or employees, increasing the risk of credential theft and further compromise. Additionally, the integrity of the website can be compromised through defacement or injection of malicious content, which may lead to downtime or loss of business. Given the theme's niche, organizations relying on it for e-commerce or appointment bookings may face financial losses and regulatory scrutiny. The vulnerability's ease of exploitation over the network without authentication increases the attack surface, making it a critical concern for any European entity using this theme. The potential for cross-site scripting to affect availability, though limited, could disrupt services temporarily. Overall, the threat could impact confidentiality, integrity, and availability, with cascading effects on compliance and customer trust.

Mitigation Recommendations

European organizations should immediately audit their websites to identify the use of the NooTheme Yogi - Health Beauty & Yoga theme, particularly versions up to 2.9.2. Since no patches are currently available, temporary mitigations include deploying a robust Web Application Firewall (WAF) configured to detect and block reflected XSS payloads targeting the theme's known vulnerable parameters. Input validation and output encoding should be enforced at the application level where possible, especially for user-supplied data reflected in responses. Organizations should also implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. User education campaigns can reduce the risk of successful exploitation by warning users against clicking suspicious links. Monitoring web server logs for unusual request patterns or repeated attempts to inject scripts can help detect exploitation attempts early. Once a patch is released by NooTheme, organizations must prioritize timely updates. Additionally, consider isolating or sandboxing affected web applications to limit the impact of potential compromises. Regular security assessments and penetration testing focused on XSS vulnerabilities will help maintain ongoing resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-07-28T10:56:24.796Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc7f2ca26fb4dd2f58ba7

Added to database: 11/6/2025, 4:08:18 PM

Last enriched: 1/20/2026, 8:51:11 PM

Last updated: 2/7/2026, 3:35:44 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats