Skip to main content

CVE-2025-5845: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchop Affiliate Reviews

Medium
VulnerabilityCVE-2025-5845cvecve-2025-5845cwe-79
Published: Wed Jul 16 2025 (07/16/2025, 06:40:42 UTC)
Source: CVE Database V5
Vendor/Project: wpchop
Product: Affiliate Reviews

Description

The Affiliate Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘numColumns’ parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/16/2025, 07:02:38 UTC

Technical Analysis

CVE-2025-5845 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Affiliate Reviews plugin for WordPress developed by wpchop. This vulnerability exists in all versions up to and including 1.0.6. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'numColumns' parameter. Authenticated users with Contributor-level privileges or higher can exploit this flaw by injecting arbitrary malicious scripts into pages generated by the plugin. These scripts are then stored and executed in the context of any user who visits the affected page, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the Contributor level, but does not require user interaction. The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which relates to improper input validation leading to XSS attacks.

Potential Impact

For European organizations using WordPress sites with the Affiliate Reviews plugin, this vulnerability poses a significant risk to web application security. Exploitation could lead to unauthorized script execution in the browsers of site visitors or administrators, potentially compromising user credentials, session tokens, or enabling further attacks such as phishing or malware distribution. Given that Contributor-level access is required, insider threats or compromised accounts could be leveraged to exploit this vulnerability. The impact on confidentiality and integrity is moderate due to the ability to steal sensitive information or manipulate content. Availability is not directly affected. Organizations in Europe that rely on WordPress for e-commerce, customer engagement, or content management could face reputational damage, regulatory scrutiny under GDPR if personal data is compromised, and operational disruptions. The medium severity score reflects the balance between required privileges and potential damage, but the scope change indicates that the impact could extend beyond the plugin itself, affecting the broader WordPress environment.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, they should audit their WordPress installations to identify the presence of the Affiliate Reviews plugin and verify the version in use. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. If disabling is not feasible, strict role management should be enforced to limit Contributor-level access only to trusted users, reducing the risk of exploitation. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'numColumns' parameter can provide additional protection. Regular monitoring of logs for unusual input patterns or script injections is recommended. Organizations should also educate users with elevated privileges about the risks of inputting untrusted data. Once a patch becomes available, prompt application of the update is critical. Additionally, employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-06T22:45:29.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68774ab7a83201eaacd43803

Added to database: 7/16/2025, 6:46:15 AM

Last enriched: 7/16/2025, 7:02:38 AM

Last updated: 7/16/2025, 8:46:11 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats