CVE-2025-58880: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reubenthiessen Translate This gTranslate Shortcode allows Stored XSS. This issue affects Translate This gTranslate Shortcode: from n/a through 1.0.
AI Analysis
Technical Summary
CVE-2025-58880 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in the WordPress plugin 'Translate This gTranslate Shortcode' developed by reubenthiessen. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary JavaScript code within the plugin's output. When a victim visits a page containing the malicious payload, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability affects versions up to 1.0, with no specific version range provided. The CVSS v3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, indicating that the attack can be performed remotely over the network with low attack complexity, requires low privileges and user interaction, and impacts confidentiality, integrity, and availability to a limited extent but with scope change (meaning the vulnerability can affect resources beyond the vulnerable component). No public exploits are currently known in the wild, and no patches or mitigation links have been published yet. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, including administrators, increasing the risk of widespread compromise.
Potential Impact
For European organizations using WordPress websites with the 'Translate This gTranslate Shortcode' plugin, this vulnerability poses a significant risk. Stored XSS can lead to unauthorized access to user accounts, including administrative accounts, data leakage, and potential defacement or redirection of websites. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and cause operational disruptions. Since the vulnerability requires low privileges but user interaction, attackers might leverage social engineering or phishing to trick users into triggering the payload. The scope change in the CVSS vector suggests that the impact could extend beyond the plugin itself, potentially affecting other components or user sessions. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, exploitation could have broad consequences, including financial loss and erosion of customer trust.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the 'Translate This gTranslate Shortcode' plugin and assess the version in use. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing Web Application Firewalls (WAF) with rules to detect and block common XSS payloads can provide interim protection. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Organizations should also conduct thorough input validation and output encoding on all user-generated content and shortcode inputs if they maintain or customize the plugin. Regular security awareness training to reduce the likelihood of successful social engineering attacks is recommended. Monitoring web server logs and user activity for unusual behavior can help detect exploitation attempts early. Once a patch becomes available, prompt application of updates is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-58880: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reubenthiessen Translate This gTranslate Shortcode allows Stored XSS. This issue affects Translate This gTranslate Shortcode: from n/a through 1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-58880 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in the WordPress plugin 'Translate This gTranslate Shortcode' developed by reubenthiessen. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary JavaScript code within the plugin's output. When a victim visits a page containing the malicious payload, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability affects versions up to 1.0, with no specific version range provided. The CVSS v3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, indicating that the attack can be performed remotely over the network with low attack complexity, requires low privileges and user interaction, and impacts confidentiality, integrity, and availability to a limited extent but with scope change (meaning the vulnerability can affect resources beyond the vulnerable component). No public exploits are currently known in the wild, and no patches or mitigation links have been published yet. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and can affect multiple users, including administrators, increasing the risk of widespread compromise.
Potential Impact
For European organizations using WordPress websites with the 'Translate This gTranslate Shortcode' plugin, this vulnerability poses a significant risk. Stored XSS can lead to unauthorized access to user accounts, including administrative accounts, data leakage, and potential defacement or redirection of websites. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and cause operational disruptions. Since the vulnerability requires low privileges but user interaction, attackers might leverage social engineering or phishing to trick users into triggering the payload. The scope change in the CVSS vector suggests that the impact could extend beyond the plugin itself, potentially affecting other components or user sessions. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, exploitation could have broad consequences, including financial loss and erosion of customer trust.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the 'Translate This gTranslate Shortcode' plugin and assess the version in use. Until an official patch is released, organizations should consider disabling or uninstalling the plugin to eliminate the attack vector. Implementing Web Application Firewalls (WAF) with rules to detect and block common XSS payloads can provide interim protection. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Organizations should also conduct thorough input validation and output encoding on all user-generated content and shortcode inputs if they maintain or customize the plugin. Regular security awareness training to reduce the likelihood of successful social engineering attacks is recommended. Monitoring web server logs and user activity for unusual behavior can help detect exploitation attempts early. Once a patch becomes available, prompt application of updates is critical.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:50:17.983Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68baeaa757c5b37b67a461d8
Added to database: 9/5/2025, 1:50:31 PM
Last enriched: 9/5/2025, 2:02:30 PM
Last updated: 10/18/2025, 4:48:27 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62669: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in The Wikimedia Foundation Mediawiki - CentralAuth Extension
MediumCVE-2025-62668: CWE-276 Incorrect Default Permissions in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension
MediumCVE-2025-62671: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Cargo Extension
MediumCVE-2025-62670: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - FlexDiagrams Extension
MediumCVE-2025-11361: CWE-918 Server-Side Request Forgery (SSRF) in wpdevteam Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.