CVE-2025-5490: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in antoineh Football Pool
The Football Pool plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.12.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-5490 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the Football Pool plugin for WordPress, developed by antoineh. This vulnerability exists in all versions up to and including 2.12.4. The root cause is insufficient input sanitization and output escaping in the plugin's admin settings, which allows authenticated users with administrator-level permissions or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page. The vulnerability specifically affects multi-site WordPress installations and those where the 'unfiltered_html' capability is disabled, limiting the ability to input raw HTML. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but demands high privileges (administrator) and no user interaction. The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are currently reported in the wild. Since the vulnerability requires administrator privileges, exploitation is limited to insiders or compromised admin accounts. However, once exploited, it can lead to persistent script injection affecting all users who visit the injected pages, potentially enabling session hijacking, defacement, or further attacks leveraging the victim's browser context. The lack of patches at the time of reporting indicates that mitigation relies on configuration changes or restricting admin access until updates are available.
Potential Impact
For European organizations using WordPress multi-site installations with the Football Pool plugin (versions up to 2.12.4), this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the primary threat is from malicious insiders or attackers who have already compromised admin credentials. Successful exploitation can lead to persistent XSS attacks that compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users. This can damage organizational reputation, lead to data breaches, and potentially facilitate further attacks such as privilege escalation or lateral movement within the network. Organizations with large user bases or those hosting sensitive data on WordPress multi-site environments are particularly at risk. The requirement that 'unfiltered_html' be disabled means that sites with stricter content filtering are vulnerable, which is common in security-conscious environments. Given the widespread use of WordPress in Europe, especially among SMEs and media companies, the impact could be significant if exploited. However, the medium severity and high privilege requirement reduce the likelihood of widespread exploitation.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting administrator access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Review and audit all administrator accounts and their recent activities for signs of compromise or unauthorized changes. 3. Temporarily disable or remove the Football Pool plugin from multi-site WordPress installations until a security patch is released. 4. If removal is not feasible, consider enabling 'unfiltered_html' capability temporarily for administrators to allow safe content input or apply manual input sanitization and output escaping in the plugin code as a stopgap measure. 5. Monitor web server logs and WordPress activity logs for unusual script injections or suspicious admin actions. 6. Educate administrators on the risks of XSS and the importance of validating and sanitizing inputs. 7. Once a patch or update is released by the vendor, prioritize its deployment across all affected systems. 8. Employ Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting WordPress plugins. 9. Regularly back up WordPress sites and databases to enable quick restoration in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-5490: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in antoineh Football Pool
Description
The Football Pool plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.12.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-5490 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the Football Pool plugin for WordPress, developed by antoineh. This vulnerability exists in all versions up to and including 2.12.4. The root cause is insufficient input sanitization and output escaping in the plugin's admin settings, which allows authenticated users with administrator-level permissions or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page. The vulnerability specifically affects multi-site WordPress installations and those where the 'unfiltered_html' capability is disabled, limiting the ability to input raw HTML. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but demands high privileges (administrator) and no user interaction. The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are currently reported in the wild. Since the vulnerability requires administrator privileges, exploitation is limited to insiders or compromised admin accounts. However, once exploited, it can lead to persistent script injection affecting all users who visit the injected pages, potentially enabling session hijacking, defacement, or further attacks leveraging the victim's browser context. The lack of patches at the time of reporting indicates that mitigation relies on configuration changes or restricting admin access until updates are available.
Potential Impact
For European organizations using WordPress multi-site installations with the Football Pool plugin (versions up to 2.12.4), this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the primary threat is from malicious insiders or attackers who have already compromised admin credentials. Successful exploitation can lead to persistent XSS attacks that compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of users. This can damage organizational reputation, lead to data breaches, and potentially facilitate further attacks such as privilege escalation or lateral movement within the network. Organizations with large user bases or those hosting sensitive data on WordPress multi-site environments are particularly at risk. The requirement that 'unfiltered_html' be disabled means that sites with stricter content filtering are vulnerable, which is common in security-conscious environments. Given the widespread use of WordPress in Europe, especially among SMEs and media companies, the impact could be significant if exploited. However, the medium severity and high privilege requirement reduce the likelihood of widespread exploitation.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting administrator access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Review and audit all administrator accounts and their recent activities for signs of compromise or unauthorized changes. 3. Temporarily disable or remove the Football Pool plugin from multi-site WordPress installations until a security patch is released. 4. If removal is not feasible, consider enabling 'unfiltered_html' capability temporarily for administrators to allow safe content input or apply manual input sanitization and output escaping in the plugin code as a stopgap measure. 5. Monitor web server logs and WordPress activity logs for unusual script injections or suspicious admin actions. 6. Educate administrators on the risks of XSS and the importance of validating and sanitizing inputs. 7. Once a patch or update is released by the vendor, prioritize its deployment across all affected systems. 8. Employ Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting WordPress plugins. 9. Regularly back up WordPress sites and databases to enable quick restoration in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-02T23:14:09.364Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6853a44633c7acc046086d95
Added to database: 6/19/2025, 5:46:46 AM
Last enriched: 6/19/2025, 6:01:35 AM
Last updated: 7/31/2025, 3:20:37 AM
Views: 17
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.