CVE-2025-6012: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kaisercrazy Auto Attachments
The Auto Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-6012 is a stored Cross-Site Scripting vulnerability classified under CWE-79, found in the Auto Attachments plugin for WordPress developed by kaisercrazy. This vulnerability exists in all versions up to and including 1.8.5 due to insufficient input sanitization and output escaping in the plugin’s admin settings interface. An attacker with authenticated administrator-level permissions or higher can inject arbitrary JavaScript code into pages generated by the plugin. These scripts execute whenever any user accesses the compromised page, potentially allowing session hijacking, defacement, or other malicious actions. The vulnerability specifically affects multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the contexts in which it can be exploited. The CVSS 3.1 vector indicates a network attack vector (AV:N), high attack complexity (AC:H), requiring high privileges (PR:H), no user interaction (UI:N), with a scope change (S:C), and low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No patches or fixes have been published at the time of disclosure, and no known exploits are currently active in the wild. The vulnerability was reserved and published in June 2025 by Wordfence. The core issue is the improper neutralization of input during web page generation, allowing stored XSS payloads to persist in the plugin’s settings and execute in the context of site visitors or administrators.
Potential Impact
The primary impact of CVE-2025-6012 is the potential for stored XSS attacks that can compromise the confidentiality and integrity of user sessions and data. An attacker with administrator privileges can inject malicious scripts that execute in the browsers of users who visit the affected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of users. Although the attack requires high privileges, the scope change means that the vulnerability can affect multiple sites in a multi-site WordPress environment, increasing the potential impact. The availability impact is low but could include defacement or disruption of site functionality. Organizations running multi-site WordPress installations with the Auto Attachments plugin and disabled unfiltered_html are at risk of persistent cross-site scripting attacks that could undermine trust and lead to data breaches or further compromise. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability’s presence in a widely used CMS plugin makes it a notable risk for targeted attacks.
Mitigation Recommendations
To mitigate CVE-2025-6012, organizations should immediately audit their WordPress environments to identify installations of the Auto Attachments plugin, especially multi-site setups or those with unfiltered_html disabled. Since no official patch is currently available, administrators should consider temporarily disabling or uninstalling the plugin to eliminate the attack vector. If disabling is not feasible, restrict administrator access to trusted personnel only and monitor admin settings for unauthorized changes. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the plugin’s settings pages. Additionally, enforce Content Security Policy (CSP) headers to limit the execution of injected scripts. Regularly review user privileges to ensure that only necessary users have administrator-level access. Once a patch is released, apply it promptly. Finally, educate administrators about the risks of stored XSS and encourage the use of security plugins that sanitize inputs and outputs more robustly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, South Africa
CVE-2025-6012: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kaisercrazy Auto Attachments
Description
The Auto Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-6012 is a stored Cross-Site Scripting vulnerability classified under CWE-79, found in the Auto Attachments plugin for WordPress developed by kaisercrazy. This vulnerability exists in all versions up to and including 1.8.5 due to insufficient input sanitization and output escaping in the plugin’s admin settings interface. An attacker with authenticated administrator-level permissions or higher can inject arbitrary JavaScript code into pages generated by the plugin. These scripts execute whenever any user accesses the compromised page, potentially allowing session hijacking, defacement, or other malicious actions. The vulnerability specifically affects multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting the contexts in which it can be exploited. The CVSS 3.1 vector indicates a network attack vector (AV:N), high attack complexity (AC:H), requiring high privileges (PR:H), no user interaction (UI:N), with a scope change (S:C), and low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No patches or fixes have been published at the time of disclosure, and no known exploits are currently active in the wild. The vulnerability was reserved and published in June 2025 by Wordfence. The core issue is the improper neutralization of input during web page generation, allowing stored XSS payloads to persist in the plugin’s settings and execute in the context of site visitors or administrators.
Potential Impact
The primary impact of CVE-2025-6012 is the potential for stored XSS attacks that can compromise the confidentiality and integrity of user sessions and data. An attacker with administrator privileges can inject malicious scripts that execute in the browsers of users who visit the affected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of users. Although the attack requires high privileges, the scope change means that the vulnerability can affect multiple sites in a multi-site WordPress environment, increasing the potential impact. The availability impact is low but could include defacement or disruption of site functionality. Organizations running multi-site WordPress installations with the Auto Attachments plugin and disabled unfiltered_html are at risk of persistent cross-site scripting attacks that could undermine trust and lead to data breaches or further compromise. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability’s presence in a widely used CMS plugin makes it a notable risk for targeted attacks.
Mitigation Recommendations
To mitigate CVE-2025-6012, organizations should immediately audit their WordPress environments to identify installations of the Auto Attachments plugin, especially multi-site setups or those with unfiltered_html disabled. Since no official patch is currently available, administrators should consider temporarily disabling or uninstalling the plugin to eliminate the attack vector. If disabling is not feasible, restrict administrator access to trusted personnel only and monitor admin settings for unauthorized changes. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the plugin’s settings pages. Additionally, enforce Content Security Policy (CSP) headers to limit the execution of injected scripts. Regularly review user privileges to ensure that only necessary users have administrator-level access. Once a patch is released, apply it promptly. Finally, educate administrators about the risks of stored XSS and encourage the use of security plugins that sanitize inputs and outputs more robustly.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-11T18:57:35.138Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 684bd490a8c9212743802d9c
Added to database: 6/13/2025, 7:34:40 AM
Last enriched: 2/27/2026, 3:53:51 PM
Last updated: 3/24/2026, 7:47:19 PM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.