CVE-2025-5939: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amir-mousavi Telegram for WP
The Telegram for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-5939 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Telegram for WP plugin for WordPress, developed by amir-mousavi. This vulnerability affects all versions up to and including 1.6.1. The root cause is improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping in the plugin's admin settings. The vulnerability manifests in multi-site WordPress installations or installations where the 'unfiltered_html' capability is disabled. An attacker with administrator-level permissions or higher can inject arbitrary JavaScript code into the admin settings pages. This malicious script will execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other client-side attacks. The vulnerability requires high privileges (administrator or above) to exploit, no user interaction is needed once the script is injected, and the attack surface is limited to multi-site or restricted HTML environments. The CVSS v3.1 base score is 4.4 (medium severity), reflecting the network attack vector, high attack complexity, required privileges, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. There are no known exploits in the wild and no patches currently available as of the publication date (June 13, 2025).
Potential Impact
For European organizations using WordPress multi-site installations with the Telegram for WP plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the primary threat is from insider attackers or attackers who have already compromised admin credentials. Successful exploitation can lead to injection of malicious scripts that execute in the context of other administrators or users with access to the affected pages, potentially enabling theft of session tokens, unauthorized actions, or spreading malware within the organization’s web environment. This can undermine the confidentiality and integrity of administrative operations and user data. Given the plugin’s niche use case (integrating Telegram with WordPress), the impact is more pronounced in organizations relying heavily on this integration for communication or customer engagement. The vulnerability does not affect availability directly but could facilitate further attacks that degrade service. European organizations with strict data protection regulations (e.g., GDPR) may face compliance risks if user data is compromised through this vulnerability.
Mitigation Recommendations
Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms (e.g., multi-factor authentication) to reduce the risk of credential compromise. Audit and monitor multi-site WordPress installations for unusual administrative activity or unauthorized changes in plugin settings. Temporarily disable or remove the Telegram for WP plugin in multi-site environments until a security patch is released. If disabling the plugin is not feasible, limit the use of multi-site installations or enable 'unfiltered_html' capability cautiously, understanding the security trade-offs. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the WordPress admin interface. Regularly update WordPress core and plugins, and subscribe to vendor or security mailing lists for timely patch releases. Conduct periodic security reviews and penetration testing focusing on WordPress plugins and multi-site configurations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-5939: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in amir-mousavi Telegram for WP
Description
The Telegram for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-5939 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Telegram for WP plugin for WordPress, developed by amir-mousavi. This vulnerability affects all versions up to and including 1.6.1. The root cause is improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping in the plugin's admin settings. The vulnerability manifests in multi-site WordPress installations or installations where the 'unfiltered_html' capability is disabled. An attacker with administrator-level permissions or higher can inject arbitrary JavaScript code into the admin settings pages. This malicious script will execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other client-side attacks. The vulnerability requires high privileges (administrator or above) to exploit, no user interaction is needed once the script is injected, and the attack surface is limited to multi-site or restricted HTML environments. The CVSS v3.1 base score is 4.4 (medium severity), reflecting the network attack vector, high attack complexity, required privileges, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. There are no known exploits in the wild and no patches currently available as of the publication date (June 13, 2025).
Potential Impact
For European organizations using WordPress multi-site installations with the Telegram for WP plugin, this vulnerability poses a moderate risk. Since exploitation requires administrator-level access, the primary threat is from insider attackers or attackers who have already compromised admin credentials. Successful exploitation can lead to injection of malicious scripts that execute in the context of other administrators or users with access to the affected pages, potentially enabling theft of session tokens, unauthorized actions, or spreading malware within the organization’s web environment. This can undermine the confidentiality and integrity of administrative operations and user data. Given the plugin’s niche use case (integrating Telegram with WordPress), the impact is more pronounced in organizations relying heavily on this integration for communication or customer engagement. The vulnerability does not affect availability directly but could facilitate further attacks that degrade service. European organizations with strict data protection regulations (e.g., GDPR) may face compliance risks if user data is compromised through this vulnerability.
Mitigation Recommendations
Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms (e.g., multi-factor authentication) to reduce the risk of credential compromise. Audit and monitor multi-site WordPress installations for unusual administrative activity or unauthorized changes in plugin settings. Temporarily disable or remove the Telegram for WP plugin in multi-site environments until a security patch is released. If disabling the plugin is not feasible, limit the use of multi-site installations or enable 'unfiltered_html' capability cautiously, understanding the security trade-offs. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the WordPress admin interface. Regularly update WordPress core and plugins, and subscribe to vendor or security mailing lists for timely patch releases. Conduct periodic security reviews and penetration testing focusing on WordPress plugins and multi-site configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-09T15:51:41.340Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 684b8f24358c65714e6b57b3
Added to database: 6/13/2025, 2:38:28 AM
Last enriched: 6/13/2025, 2:54:10 AM
Last updated: 7/30/2025, 4:17:16 PM
Views: 16
Related Threats
CVE-2025-8314: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emarket-design Project Management, Bug and Issue Tracking Plugin – Software Issue Manager
MediumCVE-2025-8059: CWE-862 Missing Authorization in bplugins B Blocks – The ultimate block collection
CriticalCVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumCVE-2025-8685: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emilien Wp chart generator
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.