Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58974: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in StellarWP WPComplete

0
Medium
VulnerabilityCVE-2025-58974cvecve-2025-58974cwe-79
Published: Mon Sep 22 2025 (09/22/2025, 18:26:08 UTC)
Source: CVE Database V5
Vendor/Project: StellarWP
Product: WPComplete

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StellarWP WPComplete allows Stored XSS. This issue affects WPComplete: from n/a through 2.9.5.2.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:02:56 UTC

Technical Analysis

CVE-2025-58974 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the WPComplete plugin developed by StellarWP. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. The flaw allows an attacker with at least low privileges (PR:L) and requiring user interaction (UI:R) to inject malicious scripts that are persistently stored and later executed in the context of other users visiting the affected pages. The vulnerability affects all versions of WPComplete up to and including 2.9.5.2. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), and a scope change (S:C) meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability losses (C:L/I:L/A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability requires an authenticated user with some privileges to inject the payload, and a victim user to interact with the malicious content for exploitation to succeed. Stored XSS can lead to session hijacking, defacement, or distribution of malware, posing significant risks especially in environments where WPComplete is used to manage learning or content completion workflows on WordPress sites.

Potential Impact

For European organizations, particularly those using WordPress with the WPComplete plugin to manage e-learning or content completion, this vulnerability could lead to unauthorized access to user sessions, theft of sensitive information, or manipulation of site content. Given the persistent nature of stored XSS, attackers could target administrators or users with elevated privileges, potentially escalating the impact. This could disrupt business operations, damage reputation, and lead to non-compliance with GDPR if personal data is compromised. The medium severity suggests a moderate risk, but the scope change and ability to affect multiple users elevate the concern. Organizations in sectors such as education, training, and corporate learning platforms are especially at risk, as they often rely on WPComplete for tracking progress and engagement. The absence of known exploits currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the use of the WPComplete plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin if feasible. Implementing Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads can provide interim protection. Additionally, enforcing strict Content Security Policies (CSP) can mitigate the impact of injected scripts by restricting script execution sources. User input validation and sanitization should be reviewed and enhanced wherever possible, especially for inputs that WPComplete processes. Monitoring logs for unusual activity or injection attempts is recommended. Organizations should also educate users about the risks of interacting with suspicious content and ensure that user privileges are minimized to the least necessary level to reduce the attack surface. Once a patch is available, prompt application is critical. Regular backups and incident response plans should be updated to handle potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:45:16.549Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d197d705d26ef415250902

Added to database: 9/22/2025, 6:39:19 PM

Last enriched: 9/30/2025, 1:02:56 AM

Last updated: 10/7/2025, 1:41:22 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats