Skip to main content

CVE-2025-5684: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xpeedstudio MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor

Medium
VulnerabilityCVE-2025-5684cvecve-2025-5684cwe-79
Published: Tue Jul 29 2025 (07/29/2025, 19:42:33 UTC)
Source: CVE Database V5
Vendor/Project: xpeedstudio
Product: MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor

Description

The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `mf-template` DOM Element in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/29/2025, 20:02:50 UTC

Technical Analysis

CVE-2025-5684 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the MetForm plugin for WordPress, developed by xpeedstudio. This plugin is widely used for creating contact forms, surveys, quizzes, and custom forms within the Elementor page builder environment. The vulnerability arises from improper neutralization of input during web page generation, specifically via the 'mf-template' DOM element. Due to insufficient input sanitization and output escaping, authenticated users with Contributor-level privileges or higher can inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability affects all versions up to and including 4.0.1. The CVSS 3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the Contributor level, but no user interaction is needed. The scope is changed, indicating that the vulnerability can affect resources beyond the initially vulnerable component. Currently, there are no known exploits in the wild, and no official patches have been released yet. However, the presence of this vulnerability in a popular WordPress plugin used by many websites makes it a significant risk, especially for sites that allow multiple user roles with Contributor or higher privileges.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites and web applications built on WordPress using the MetForm plugin. Exploitation could lead to unauthorized script execution, enabling attackers to steal sensitive information such as authentication cookies, perform actions on behalf of legitimate users, or deliver malware payloads. This can result in reputational damage, loss of customer trust, and potential regulatory non-compliance under GDPR if personal data is compromised. Since the vulnerability requires authenticated access at Contributor level or above, organizations with lax user role management or large numbers of contributors are at higher risk. The impact is particularly critical for sectors relying heavily on web presence and customer interaction, such as e-commerce, government portals, and financial services. Additionally, the cross-site scripting flaw could be leveraged as a stepping stone for more complex attacks, including privilege escalation or lateral movement within the web application environment.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Immediately audit user roles and permissions within WordPress to ensure that only trusted users have Contributor-level or higher access. Remove or downgrade unnecessary privileges. 2) Monitor and review all content submitted via MetForm forms, especially those involving the 'mf-template' element, for suspicious or unexpected script content. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting the vulnerable DOM element. 4) Isolate or sandbox the affected plugin's output where possible to limit script execution impact. 5) Maintain regular backups of website content to enable quick restoration if exploitation occurs. 6) Stay alert for official patches or updates from xpeedstudio and apply them promptly once available. 7) Consider temporarily disabling or replacing the MetForm plugin with alternative secure form builders until a fix is released. 8) Educate site administrators and contributors about the risks of injecting untrusted content and enforce strict content validation policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-04T13:25:47.215Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68892561ad5a09ad00908c72

Added to database: 7/29/2025, 7:47:45 PM

Last enriched: 7/29/2025, 8:02:50 PM

Last updated: 7/30/2025, 4:00:57 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats