Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60244: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in RealMag777 TableOn

0
High
VulnerabilityCVE-2025-60244cvecve-2025-60244
Published: Thu Nov 06 2025 (11/06/2025, 15:55:18 UTC)
Source: CVE Database V5
Vendor/Project: RealMag777
Product: TableOn

Description

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in RealMag777 TableOn posts-table-filterable allows Code Injection.This issue affects TableOn: from n/a through <= 1.0.4.2.

AI-Powered Analysis

AILast updated: 11/20/2025, 18:23:55 UTC

Technical Analysis

CVE-2025-60244 is a vulnerability classified as improper neutralization of script-related HTML tags, commonly known as a basic Cross-Site Scripting (XSS) flaw, found in the RealMag777 TableOn plugin, specifically in the posts-table-filterable component. This vulnerability affects all versions up to and including 1.0.4.2. The flaw allows an attacker to inject arbitrary script code into web pages rendered by the plugin, which is then executed in the context of users visiting the affected site. The vulnerability does not require any privileges (AV:N) and has low attack complexity (AC:L), but it requires user interaction (UI:R), such as clicking a crafted link or visiting a malicious page. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, potentially compromising the entire web application. The impact includes partial loss of confidentiality, integrity, and availability (C:L/I:L/A:L), enabling attackers to steal session cookies, manipulate page content, or disrupt service. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for websites using this plugin. The lack of available patches at the time of reporting emphasizes the need for proactive mitigation. The vulnerability was reserved in late September 2025 and published in early November 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web applications using the RealMag777 TableOn plugin, especially those relying on the posts-table-filterable feature for content display. Exploitation can lead to session hijacking, unauthorized data access, defacement of websites, and potential spread of malware through injected scripts. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches due to data exposure), and disrupt business operations. The vulnerability's ability to affect confidentiality, integrity, and availability means sensitive customer or internal data could be compromised or manipulated. Given the widespread use of WordPress and its plugins across Europe, organizations in sectors such as e-commerce, media, and public services are particularly at risk. The requirement for user interaction means phishing or social engineering could facilitate attacks, increasing the threat surface. The absence of known exploits currently provides a window for mitigation but also necessitates vigilance as attackers may develop exploits rapidly.

Mitigation Recommendations

1. Monitor for official patches or updates from RealMag777 and apply them immediately once available. 2. Until patches are released, implement strict input validation and output encoding on all user-supplied data related to the posts-table-filterable feature to neutralize script tags and prevent injection. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Use Web Application Firewalls (WAFs) with rules targeting XSS patterns to detect and block malicious payloads targeting this vulnerability. 5. Educate users and administrators about the risks of clicking untrusted links or interacting with suspicious content to reduce successful exploitation via social engineering. 6. Conduct security audits and penetration testing focused on XSS vulnerabilities in the affected web applications. 7. Consider temporary disabling or replacing the TableOn plugin if immediate patching is not feasible, especially on high-risk or public-facing sites. 8. Implement multi-factor authentication (MFA) to limit the impact of session hijacking resulting from XSS exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:34:44.964Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc80cca26fb4dd2f595e8

Added to database: 11/6/2025, 4:08:44 PM

Last enriched: 11/20/2025, 6:23:55 PM

Last updated: 11/22/2025, 3:17:33 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats