CVE-2025-5940: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in osompress Osom Blocks – Custom Post Type listing block
The Osom Blocks – Custom Post Type listing block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘class_name’ parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-5940 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Osom Blocks – Custom Post Type listing block plugin for WordPress, specifically in the handling of the 'class_name' parameter. The vulnerability stems from insufficient input sanitization and output escaping, which allows an authenticated attacker with Contributor-level or higher privileges to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 1.2.1. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required (low), no user interaction, and a scope change due to impact on other components. The impact affects confidentiality and integrity but not availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability was assigned by Wordfence and publicly disclosed on June 27, 2025. This issue highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content or parameters to be rendered in web pages.
Potential Impact
The primary impact of CVE-2025-5940 is the potential compromise of user confidentiality and integrity on WordPress sites using the vulnerable Osom Blocks plugin. Attackers with Contributor-level access can inject malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, credential theft, unauthorized actions, or defacement. This can undermine user trust, damage brand reputation, and lead to data breaches. Since the vulnerability requires authenticated access, the risk is somewhat limited to sites with multiple contributors or where contributor accounts may be compromised. However, the scope of affected systems is broad given WordPress's widespread use and the availability of the plugin. The vulnerability does not impact availability directly but can facilitate further attacks that might. Organizations relying on this plugin for content management or custom post type listings face increased risk of targeted attacks, especially if they have contributors with insufficiently controlled privileges.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict Contributor-level access strictly to trusted users and review existing contributor accounts for suspicious activity. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to inject scripts via the 'class_name' parameter or other suspicious payloads targeting the plugin. 3) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 4) Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 5) Consider temporarily disabling or replacing the Osom Blocks – Custom Post Type listing block plugin if feasible. 6) Stay alert for vendor updates or patches and apply them promptly once available. 7) Educate site administrators and contributors on the risks of XSS and safe content handling practices. These targeted steps go beyond generic advice by focusing on access control, detection, and containment specific to this plugin's vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-5940: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in osompress Osom Blocks – Custom Post Type listing block
Description
The Osom Blocks – Custom Post Type listing block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘class_name’ parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5940 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Osom Blocks – Custom Post Type listing block plugin for WordPress, specifically in the handling of the 'class_name' parameter. The vulnerability stems from insufficient input sanitization and output escaping, which allows an authenticated attacker with Contributor-level or higher privileges to inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes every time a user accesses the affected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 1.2.1. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required (low), no user interaction, and a scope change due to impact on other components. The impact affects confidentiality and integrity but not availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability was assigned by Wordfence and publicly disclosed on June 27, 2025. This issue highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content or parameters to be rendered in web pages.
Potential Impact
The primary impact of CVE-2025-5940 is the potential compromise of user confidentiality and integrity on WordPress sites using the vulnerable Osom Blocks plugin. Attackers with Contributor-level access can inject malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, credential theft, unauthorized actions, or defacement. This can undermine user trust, damage brand reputation, and lead to data breaches. Since the vulnerability requires authenticated access, the risk is somewhat limited to sites with multiple contributors or where contributor accounts may be compromised. However, the scope of affected systems is broad given WordPress's widespread use and the availability of the plugin. The vulnerability does not impact availability directly but can facilitate further attacks that might. Organizations relying on this plugin for content management or custom post type listings face increased risk of targeted attacks, especially if they have contributors with insufficiently controlled privileges.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict Contributor-level access strictly to trusted users and review existing contributor accounts for suspicious activity. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to inject scripts via the 'class_name' parameter or other suspicious payloads targeting the plugin. 3) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 4) Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 5) Consider temporarily disabling or replacing the Osom Blocks – Custom Post Type listing block plugin if feasible. 6) Stay alert for vendor updates or patches and apply them promptly once available. 7) Educate site administrators and contributors on the risks of XSS and safe content handling practices. These targeted steps go beyond generic advice by focusing on access control, detection, and containment specific to this plugin's vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-09T16:00:30.622Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 685e499eca1063fb87560134
Added to database: 6/27/2025, 7:34:54 AM
Last enriched: 2/27/2026, 3:44:03 PM
Last updated: 3/23/2026, 4:07:31 PM
Views: 122
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.