Skip to main content

CVE-2025-58880: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode

Medium
VulnerabilityCVE-2025-58880cvecve-2025-58880cwe-79
Published: Fri Sep 05 2025 (09/05/2025, 13:45:50 UTC)
Source: CVE Database V5
Vendor/Project: reubenthiessen
Product: Translate This gTranslate Shortcode

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reubenthiessen Translate This gTranslate Shortcode allows Stored XSS. This issue affects Translate This gTranslate Shortcode: from n/a through 1.0.

AI-Powered Analysis

AILast updated: 09/05/2025, 14:02:30 UTC

Technical Analysis

CVE-2025-58880 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in the WordPress plugin 'Translate This gTranslate Shortcode' developed by reubenthiessen. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary JavaScript code within the plugin's output. When a victim visits a page containing the malicious payload, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability affects versions up to 1.0, with no specific version range provided. The CVSS v3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, indicating that the attack can be performed remotely over the network with low attack complexity, requires low privileges and user interaction, and impacts confidentiality, integrity, and availability to a limited extent but with scope change (meaning the vulnerability can affect resources beyond the vulnerable component). No public exploits are currently known in the wild, and no patches or mitigation links have been published yet. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, including administrators, increasing the risk of widespread compromise.

Potential Impact

For European organizations using WordPress websites with the 'Translate This gTranslate Shortcode' plugin, this vulnerability poses a significant risk. Stored XSS can lead to unauthorized access to user accounts, including administrative accounts, data leakage, and potential defacement or redirection of websites. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and cause operational disruptions. Since the vulnerability requires low privileges but user interaction, attackers might leverage social engineering or phishing to trick users into triggering the payload. The scope change in the CVSS vector suggests that the impact could extend beyond the plugin itself, potentially affecting other components or user sessions. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, exploitation could have broad consequences, including financial loss and erosion of customer trust.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations for the presence of the 'Translate This gTranslate Shortcode' plugin and assess the version in use. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing Web Application Firewalls (WAF) with rules to detect and block common XSS payloads can provide interim protection. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Organizations should also conduct thorough input validation and output encoding on all user-generated content and shortcode inputs if they maintain or customize the plugin. Regular security awareness training to reduce the likelihood of successful social engineering attacks is recommended. Monitoring web server logs and user activity for unusual behavior can help detect exploitation attempts early. Once a patch becomes available, prompt application of updates is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:50:17.983Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa757c5b37b67a461d8

Added to database: 9/5/2025, 1:50:31 PM

Last enriched: 9/5/2025, 2:02:30 PM

Last updated: 9/5/2025, 8:04:46 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats