CVE-2025-60147: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in HT Plugins HT Feed
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HT Plugins HT Feed allows Stored XSS. This issue affects HT Feed: from n/a through 1.3.0.
AI Analysis
Technical Summary
CVE-2025-60147 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the HT Feed plugin developed by HT Plugins. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary scripts within the plugin's data handling processes. When a victim accesses a page that renders this stored malicious input, the injected script executes in the context of the victim's browser. The affected versions include all versions up to and including 1.3.0, with no specific earliest version identified. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The CVSS vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) indicates that the attack can be performed remotely over the network with low attack complexity, requires privileges (likely a user with some level of authenticated access), and user interaction (such as clicking a link or visiting a page) is necessary. The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes low confidentiality, integrity, and availability impacts, but the stored nature of the XSS increases the risk of persistent exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet. Stored XSS vulnerabilities can be leveraged for session hijacking, defacement, phishing, or delivering further malware, especially in environments where users have elevated privileges or sensitive data is accessible via the plugin interface.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment of the HT Feed plugin within their web infrastructure. Organizations using HT Feed to aggregate or display content may expose their users to persistent XSS attacks, potentially leading to session hijacking, unauthorized actions performed on behalf of users, or data theft. This is particularly critical for organizations handling sensitive personal data under GDPR, as exploitation could lead to data breaches and regulatory penalties. The medium severity and requirement for some level of authenticated access reduce the likelihood of mass exploitation but do not eliminate targeted attacks, especially against internal users or administrators. Additionally, the changed scope indicates that the vulnerability could affect other components or services interacting with HT Feed, amplifying the risk. The absence of known exploits suggests a window for proactive mitigation, but organizations should not delay remediation given the potential for future exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately audit all web applications and content management systems to identify instances of the HT Feed plugin version 1.3.0 or earlier. 2) Restrict plugin access to trusted users only, minimizing the number of accounts with privileges to submit or modify content that HT Feed processes. 3) Employ web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the plugin's endpoints. 4) Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Sanitize and validate all user inputs at both client and server sides, especially inputs that are stored and rendered by HT Feed. 6) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 7) Engage with the vendor or community to obtain patches or updates as soon as they become available and prioritize their deployment. 8) Educate users about the risks of clicking suspicious links or interacting with untrusted content within affected applications. These measures go beyond generic advice by focusing on access control, input validation, and layered defenses tailored to the plugin's operational context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-60147: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in HT Plugins HT Feed
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HT Plugins HT Feed allows Stored XSS. This issue affects HT Feed: from n/a through 1.3.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-60147 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the HT Feed plugin developed by HT Plugins. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary scripts within the plugin's data handling processes. When a victim accesses a page that renders this stored malicious input, the injected script executes in the context of the victim's browser. The affected versions include all versions up to and including 1.3.0, with no specific earliest version identified. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The CVSS vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) indicates that the attack can be performed remotely over the network with low attack complexity, requires privileges (likely a user with some level of authenticated access), and user interaction (such as clicking a link or visiting a page) is necessary. The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes low confidentiality, integrity, and availability impacts, but the stored nature of the XSS increases the risk of persistent exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet. Stored XSS vulnerabilities can be leveraged for session hijacking, defacement, phishing, or delivering further malware, especially in environments where users have elevated privileges or sensitive data is accessible via the plugin interface.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment of the HT Feed plugin within their web infrastructure. Organizations using HT Feed to aggregate or display content may expose their users to persistent XSS attacks, potentially leading to session hijacking, unauthorized actions performed on behalf of users, or data theft. This is particularly critical for organizations handling sensitive personal data under GDPR, as exploitation could lead to data breaches and regulatory penalties. The medium severity and requirement for some level of authenticated access reduce the likelihood of mass exploitation but do not eliminate targeted attacks, especially against internal users or administrators. Additionally, the changed scope indicates that the vulnerability could affect other components or services interacting with HT Feed, amplifying the risk. The absence of known exploits suggests a window for proactive mitigation, but organizations should not delay remediation given the potential for future exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately audit all web applications and content management systems to identify instances of the HT Feed plugin version 1.3.0 or earlier. 2) Restrict plugin access to trusted users only, minimizing the number of accounts with privileges to submit or modify content that HT Feed processes. 3) Employ web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the plugin's endpoints. 4) Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Sanitize and validate all user inputs at both client and server sides, especially inputs that are stored and rendered by HT Feed. 6) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 7) Engage with the vendor or community to obtain patches or updates as soon as they become available and prioritize their deployment. 8) Educate users about the risks of clicking suspicious links or interacting with untrusted content within affected applications. These measures go beyond generic advice by focusing on access control, input validation, and layered defenses tailored to the plugin's operational context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:27:39.209Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d6a5c85686aca512dbedee
Added to database: 9/26/2025, 2:40:08 PM
Last enriched: 9/26/2025, 2:40:25 PM
Last updated: 11/12/2025, 7:51:47 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12871: CWE-1390 Weak Authentication in aEnrich a+HRD
CriticalCVE-2025-12870: CWE-1390 Weak Authentication in aEnrich a+HRD
CriticalCVE-2025-12869: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in aEnrich a+HRD
MediumCVE-2025-12633: CWE-862 Missing Authorization in stellarwp Booking Calendar | Appointment Booking | Bookit
HighCVE-2025-12113: CWE-862 Missing Authorization in webtoffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.