Skip to main content

CVE-2025-5939: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amir-mousavi Telegram for WP

Medium
VulnerabilityCVE-2025-5939cvecve-2025-5939cwe-79
Published: Fri Jun 13 2025 (06/13/2025, 01:47:50 UTC)
Source: CVE Database V5
Vendor/Project: amir-mousavi
Product: Telegram for WP

Description

The Telegram for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 06/13/2025, 02:54:10 UTC

Technical Analysis

CVE-2025-5939 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Telegram for WP plugin for WordPress, developed by amir-mousavi. This vulnerability affects all versions up to and including 1.6.1. The root cause is improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping in the plugin's admin settings. The vulnerability manifests in multi-site WordPress installations or installations where the 'unfiltered_html' capability is disabled. An attacker with administrator-level permissions or higher can inject arbitrary JavaScript code into the admin settings pages. This malicious script will execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other client-side attacks. The vulnerability requires high privileges (administrator or above) to exploit, no user interaction is needed once the script is injected, and the attack surface is limited to multi-site or restricted HTML environments. The CVSS v3.1 base score is 4.4 (medium severity), reflecting the network attack vector, high attack complexity, required privileges, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. There are no known exploits in the wild and no patches currently available as of the publication date (June 13, 2025).

Potential Impact

For European organizations using WordPress multi-site installations with the Telegram for WP plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the primary threat is from insider attackers or attackers who have already compromised admin credentials. Successful exploitation can lead to injection of malicious scripts that execute in the context of other administrators or users with access to the affected pages, potentially enabling theft of session tokens, unauthorized actions, or spreading malware within the organization’s web environment. This can undermine the confidentiality and integrity of administrative operations and user data. Given the plugin’s niche use case (integrating Telegram with WordPress), the impact is more pronounced in organizations relying heavily on this integration for communication or customer engagement. The vulnerability does not affect availability directly but could facilitate further attacks that degrade service. European organizations with strict data protection regulations (e.g., GDPR) may face compliance risks if user data is compromised through this vulnerability.

Mitigation Recommendations

Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms (e.g., multi-factor authentication) to reduce the risk of credential compromise. Audit and monitor multi-site WordPress installations for unusual administrative activity or unauthorized changes in plugin settings. Temporarily disable or remove the Telegram for WP plugin in multi-site environments until a security patch is released. If disabling the plugin is not feasible, limit the use of multi-site installations or enable 'unfiltered_html' capability cautiously, understanding the security trade-offs. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the WordPress admin interface. Regularly update WordPress core and plugins, and subscribe to vendor or security mailing lists for timely patch releases. Conduct periodic security reviews and penetration testing focusing on WordPress plugins and multi-site configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-09T15:51:41.340Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684b8f24358c65714e6b57b3

Added to database: 6/13/2025, 2:38:28 AM

Last enriched: 6/13/2025, 2:54:10 AM

Last updated: 7/30/2025, 4:17:16 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats