CVE-2025-5699: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gsaraiva Developer Formatter
The Developer Formatter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom CSS in all versions up to, and including, 2015.0.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-5699 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Developer Formatter plugin for WordPress, maintained by gsaraiva. This vulnerability exists in all versions up to and including 2015.0.2.1 and specifically affects multi-site WordPress installations where the unfiltered_html capability is disabled. The root cause is insufficient sanitization and escaping of user input in the Custom CSS feature, which allows authenticated users with administrator-level privileges to inject arbitrary JavaScript code into pages. Because the injected scripts are stored persistently, they execute automatically whenever any user visits the affected page, potentially compromising user sessions, stealing credentials, or performing unauthorized actions on behalf of users. The vulnerability requires administrator-level authentication, limiting exploitation to trusted users or attackers who have already compromised an admin account. The CVSS 3.1 score of 5.5 reflects a medium severity, with network attack vector, low attack complexity, and no user interaction required. The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits have been reported yet, but the vulnerability's presence in a widely used CMS plugin and the potential for privilege escalation make it a significant concern for affected WordPress multi-site environments.
Potential Impact
The primary impact of CVE-2025-5699 is the potential for stored XSS attacks within multi-site WordPress installations using the Developer Formatter plugin. Successful exploitation allows an attacker with administrator privileges to inject malicious scripts that execute in the browsers of users visiting the compromised pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and potential further compromise of the WordPress environment. Although exploitation requires admin-level access, the vulnerability can facilitate lateral movement or privilege escalation if an attacker gains initial foothold. The scope is limited to multi-site installations with unfiltered_html disabled, but given WordPress's widespread use in enterprises, educational institutions, and government websites, the impact can be significant. The vulnerability does not affect system availability but compromises confidentiality and integrity of user data and site content.
Mitigation Recommendations
To mitigate CVE-2025-5699, organizations should first verify if they are running multi-site WordPress installations with the Developer Formatter plugin version 2015.0.2.1 or earlier. Immediate steps include: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of credential compromise. 2) Disable or limit the use of the Custom CSS feature within the plugin if possible until a patch is available. 3) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4) Monitor and audit administrator activities for suspicious changes to CSS or page content. 5) Regularly update WordPress plugins and core to the latest versions once a patch or update addressing this vulnerability is released. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting this plugin. 7) Educate administrators on the risks of stored XSS and safe content management practices. Since no patch links are currently available, close coordination with the plugin vendor or community for updates is essential.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, South Africa
CVE-2025-5699: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gsaraiva Developer Formatter
Description
The Developer Formatter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom CSS in all versions up to, and including, 2015.0.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5699 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Developer Formatter plugin for WordPress, maintained by gsaraiva. This vulnerability exists in all versions up to and including 2015.0.2.1 and specifically affects multi-site WordPress installations where the unfiltered_html capability is disabled. The root cause is insufficient sanitization and escaping of user input in the Custom CSS feature, which allows authenticated users with administrator-level privileges to inject arbitrary JavaScript code into pages. Because the injected scripts are stored persistently, they execute automatically whenever any user visits the affected page, potentially compromising user sessions, stealing credentials, or performing unauthorized actions on behalf of users. The vulnerability requires administrator-level authentication, limiting exploitation to trusted users or attackers who have already compromised an admin account. The CVSS 3.1 score of 5.5 reflects a medium severity, with network attack vector, low attack complexity, and no user interaction required. The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits have been reported yet, but the vulnerability's presence in a widely used CMS plugin and the potential for privilege escalation make it a significant concern for affected WordPress multi-site environments.
Potential Impact
The primary impact of CVE-2025-5699 is the potential for stored XSS attacks within multi-site WordPress installations using the Developer Formatter plugin. Successful exploitation allows an attacker with administrator privileges to inject malicious scripts that execute in the browsers of users visiting the compromised pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and potential further compromise of the WordPress environment. Although exploitation requires admin-level access, the vulnerability can facilitate lateral movement or privilege escalation if an attacker gains initial foothold. The scope is limited to multi-site installations with unfiltered_html disabled, but given WordPress's widespread use in enterprises, educational institutions, and government websites, the impact can be significant. The vulnerability does not affect system availability but compromises confidentiality and integrity of user data and site content.
Mitigation Recommendations
To mitigate CVE-2025-5699, organizations should first verify if they are running multi-site WordPress installations with the Developer Formatter plugin version 2015.0.2.1 or earlier. Immediate steps include: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of credential compromise. 2) Disable or limit the use of the Custom CSS feature within the plugin if possible until a patch is available. 3) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4) Monitor and audit administrator activities for suspicious changes to CSS or page content. 5) Regularly update WordPress plugins and core to the latest versions once a patch or update addressing this vulnerability is released. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting this plugin. 7) Educate administrators on the risks of stored XSS and safe content management practices. Since no patch links are currently available, close coordination with the plugin vendor or community for updates is essential.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-04T20:37:32.506Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68429199182aa0cae20492f8
Added to database: 6/6/2025, 6:58:33 AM
Last enriched: 2/27/2026, 3:30:05 PM
Last updated: 3/25/2026, 1:42:50 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.