CVE-2025-58674: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Automattic WordPress
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
AI Analysis
Technical Summary
CVE-2025-58674 is a stored Cross-site Scripting (XSS) vulnerability identified in Automattic's WordPress platform, affecting versions up to and including 6.8.2. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of a victim's browser. This specific flaw requires the attacker to have Author or higher privileges within the WordPress environment, meaning that the attacker must already have a relatively high level of access to the system to exploit it. The vulnerability allows an attacker to inject malicious scripts that can compromise the confidentiality, integrity, and availability of the affected system by executing arbitrary code in the context of other users, potentially leading to session hijacking, privilege escalation, or defacement. The CVSS 3.1 base score is 5.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Currently, there are no known exploits in the wild, and the WordPress core security team is actively working on a fix. However, the absence of a patch link indicates that no official remediation has been released yet. Given WordPress's widespread use as a content management system (CMS) globally, this vulnerability poses a significant risk to websites relying on it, especially those with multiple authors or contributors who have elevated privileges.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for businesses, media outlets, e-commerce platforms, and governmental websites that use WordPress as their CMS. Exploitation could lead to unauthorized script execution, resulting in data theft, session hijacking, or defacement of websites, which can damage reputation and erode user trust. Since the vulnerability requires Author-level privileges, insider threats or compromised accounts pose the greatest risk. The potential for privilege escalation or lateral movement within the CMS environment could lead to broader compromise of sensitive data or disruption of services. Additionally, the changed scope (S:C) implies that the attack could affect components beyond the initially vulnerable module, potentially impacting integrated plugins or themes. Given the GDPR regulations in Europe, any data breach resulting from exploitation could lead to significant regulatory fines and legal consequences. The medium severity rating suggests that while the vulnerability is not trivial, it is not among the most critical; however, the widespread deployment of WordPress in Europe amplifies the risk profile.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy. First, restrict Author and higher privileges strictly to trusted users and regularly audit user roles and permissions to minimize the attack surface. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting WordPress. Monitor logs for unusual activities related to content creation or modification by authors. Until an official patch is released, consider deploying virtual patching via WAF or security plugins that sanitize inputs and outputs. Educate content authors about safe content practices and the risks of injecting untrusted scripts. Regularly update WordPress and all plugins/themes once patches become available. Conduct security assessments and penetration testing focused on CMS components to identify any residual risks. Finally, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-58674: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Automattic WordPress
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
AI-Powered Analysis
Technical Analysis
CVE-2025-58674 is a stored Cross-site Scripting (XSS) vulnerability identified in Automattic's WordPress platform, affecting versions up to and including 6.8.2. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of a victim's browser. This specific flaw requires the attacker to have Author or higher privileges within the WordPress environment, meaning that the attacker must already have a relatively high level of access to the system to exploit it. The vulnerability allows an attacker to inject malicious scripts that can compromise the confidentiality, integrity, and availability of the affected system by executing arbitrary code in the context of other users, potentially leading to session hijacking, privilege escalation, or defacement. The CVSS 3.1 base score is 5.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Currently, there are no known exploits in the wild, and the WordPress core security team is actively working on a fix. However, the absence of a patch link indicates that no official remediation has been released yet. Given WordPress's widespread use as a content management system (CMS) globally, this vulnerability poses a significant risk to websites relying on it, especially those with multiple authors or contributors who have elevated privileges.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for businesses, media outlets, e-commerce platforms, and governmental websites that use WordPress as their CMS. Exploitation could lead to unauthorized script execution, resulting in data theft, session hijacking, or defacement of websites, which can damage reputation and erode user trust. Since the vulnerability requires Author-level privileges, insider threats or compromised accounts pose the greatest risk. The potential for privilege escalation or lateral movement within the CMS environment could lead to broader compromise of sensitive data or disruption of services. Additionally, the changed scope (S:C) implies that the attack could affect components beyond the initially vulnerable module, potentially impacting integrated plugins or themes. Given the GDPR regulations in Europe, any data breach resulting from exploitation could lead to significant regulatory fines and legal consequences. The medium severity rating suggests that while the vulnerability is not trivial, it is not among the most critical; however, the widespread deployment of WordPress in Europe amplifies the risk profile.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy. First, restrict Author and higher privileges strictly to trusted users and regularly audit user roles and permissions to minimize the attack surface. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of account compromise. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting WordPress. Monitor logs for unusual activities related to content creation or modification by authors. Until an official patch is released, consider deploying virtual patching via WAF or security plugins that sanitize inputs and outputs. Educate content authors about safe content practices and the risks of injecting untrusted scripts. Regularly update WordPress and all plugins/themes once patches become available. Conduct security assessments and penetration testing focused on CMS components to identify any residual risks. Finally, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-03T09:03:46.831Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d2ec7f8890fd6c4196a550
Added to database: 9/23/2025, 6:52:47 PM
Last enriched: 9/23/2025, 6:53:04 PM
Last updated: 11/5/2025, 7:50:59 AM
Views: 157
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12677: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mykiot KiotViet Sync
MediumCVE-2025-12676: CWE-259 Use of Hard-coded Password in mykiot KiotViet Sync
MediumCVE-2025-12675: CWE-862 Missing Authorization in mykiot KiotViet Sync
MediumCVE-2025-12674: CWE-434 Unrestricted Upload of File with Dangerous Type in mykiot KiotViet Sync
CriticalCVE-2025-12388: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Carousel Block – Responsive Image and Content Carousel
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.