Skip to main content

CVE-2025-5538: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cais BNS Featured Category

Medium
VulnerabilityCVE-2025-5538cvecve-2025-5538cwe-79
Published: Fri Jun 06 2025 (06/06/2025, 06:42:52 UTC)
Source: CVE Database V5
Vendor/Project: cais
Product: BNS Featured Category

Description

The BNS Featured Category plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bnsfc' shortcode in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/07/2025, 17:55:47 UTC

Technical Analysis

CVE-2025-5538 is a stored Cross-Site Scripting (XSS) vulnerability affecting the BNS Featured Category WordPress plugin (versions up to and including 2.8.2). The vulnerability arises from improper neutralization of input during web page generation, specifically in the handling of the 'bnsfc' shortcode's user-supplied attributes. Authenticated attackers with contributor-level privileges or higher can inject malicious JavaScript code into pages via this shortcode. Because the injected scripts are stored persistently, they execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim user. The vulnerability is rated medium severity with a CVSS 3.1 score of 6.4, reflecting its network attack vector, low attack complexity, requirement for privileges (contributor or above), no user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. No public exploits are currently known in the wild, and no patches have been linked yet. The core technical issue is insufficient input sanitization and output escaping, allowing malicious scripts to be embedded and executed in the context of the affected WordPress site.

Potential Impact

For European organizations using WordPress sites with the BNS Featured Category plugin, this vulnerability poses a significant risk to website integrity and user trust. Attackers with contributor-level access could inject persistent malicious scripts that execute in the browsers of site visitors, including administrators and editors, potentially leading to credential theft, unauthorized content modification, or further compromise of the site infrastructure. This can result in data breaches, defacement, or use of the site as a vector for broader attacks such as phishing or malware distribution. Given the widespread use of WordPress across Europe, organizations in sectors with high web presence—such as media, e-commerce, education, and government—could face reputational damage and regulatory consequences under GDPR if personal data is compromised. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but insider threats and account takeover scenarios remain realistic. The vulnerability's scope includes all versions of the plugin up to 2.8.2, so any unpatched installations remain at risk.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations for the presence of the BNS Featured Category plugin and verify the version in use. Until an official patch is released, mitigation should include restricting contributor-level access strictly to trusted users and reviewing user permissions to minimize the number of accounts with such privileges. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute inputs that could contain script tags or event handlers. Implement Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of XSS attacks. Regularly monitor site content for unauthorized script injections and conduct security scans focusing on stored XSS patterns. Once a patch is available, apply it promptly. Additionally, enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of account compromise that could lead to exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-03T15:44:09.444Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68429199182aa0cae20492e9

Added to database: 6/6/2025, 6:58:33 AM

Last enriched: 7/7/2025, 5:55:47 PM

Last updated: 8/1/2025, 8:42:23 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats