CVE-2025-6200: CWE-79 Cross-Site Scripting (XSS) in GeoDirectory
The GeoDirectory WordPress plugin before 2.8.120 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
AI Analysis
Technical Summary
CVE-2025-6200 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting - XSS) affecting the GeoDirectory WordPress plugin versions prior to 2.8.120. The vulnerability arises because the plugin fails to properly validate and escape certain shortcode attributes before rendering them on pages or posts where the shortcode is embedded. This improper handling allows users with contributor-level permissions or higher to inject malicious scripts that are stored persistently within the site content. When other users or administrators view the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The CVSS 3.1 base score is 5.9, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (contributor or higher), and user interaction (viewing the page). The vulnerability impacts confidentiality, integrity, and availability to a limited extent, with a scope change due to the potential for cross-site scripting to affect other users. No known exploits are currently reported in the wild, and no official patches or updates are linked yet. The vulnerability was published on July 11, 2025, and assigned by WPScan. Given the nature of WordPress plugins and the contributor role requirement, exploitation requires an attacker to have some level of authenticated access, but once exploited, it can lead to persistent XSS attacks affecting multiple users.
Potential Impact
For European organizations using WordPress sites with the GeoDirectory plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of legitimate users. Organizations that allow contributor or higher roles to users who may not be fully trusted or have weak internal controls are particularly at risk. The impact includes potential data leakage, defacement, or disruption of website functionality, which can harm reputation and trust. Given the widespread use of WordPress in Europe for business, government, and public-facing websites, exploitation could lead to targeted attacks against organizations with geographic directory services or location-based content. Additionally, GDPR considerations mean that any data breach resulting from such attacks could lead to regulatory penalties. The medium severity indicates that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately upgrade the GeoDirectory plugin to version 2.8.120 or later once available to ensure the vulnerability is patched. 2. Restrict contributor and higher roles to trusted users only, and review user permissions regularly to minimize the risk of malicious insiders or compromised accounts. 3. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting the sources of executable scripts. 4. Employ Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting shortcode attributes. 5. Conduct regular security audits and code reviews of custom shortcodes or plugins that handle user input to ensure proper validation and escaping. 6. Educate site administrators and content managers about the risks of XSS and the importance of sanitizing inputs. 7. Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 8. Consider disabling shortcode usage from untrusted users or implementing additional input sanitization at the application level until patches are applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6200: CWE-79 Cross-Site Scripting (XSS) in GeoDirectory
Description
The GeoDirectory WordPress plugin before 2.8.120 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-6200 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting - XSS) affecting the GeoDirectory WordPress plugin versions prior to 2.8.120. The vulnerability arises because the plugin fails to properly validate and escape certain shortcode attributes before rendering them on pages or posts where the shortcode is embedded. This improper handling allows users with contributor-level permissions or higher to inject malicious scripts that are stored persistently within the site content. When other users or administrators view the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The CVSS 3.1 base score is 5.9, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (contributor or higher), and user interaction (viewing the page). The vulnerability impacts confidentiality, integrity, and availability to a limited extent, with a scope change due to the potential for cross-site scripting to affect other users. No known exploits are currently reported in the wild, and no official patches or updates are linked yet. The vulnerability was published on July 11, 2025, and assigned by WPScan. Given the nature of WordPress plugins and the contributor role requirement, exploitation requires an attacker to have some level of authenticated access, but once exploited, it can lead to persistent XSS attacks affecting multiple users.
Potential Impact
For European organizations using WordPress sites with the GeoDirectory plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise user sessions, steal sensitive information, or perform unauthorized actions on behalf of legitimate users. Organizations that allow contributor or higher roles to users who may not be fully trusted or have weak internal controls are particularly at risk. The impact includes potential data leakage, defacement, or disruption of website functionality, which can harm reputation and trust. Given the widespread use of WordPress in Europe for business, government, and public-facing websites, exploitation could lead to targeted attacks against organizations with geographic directory services or location-based content. Additionally, GDPR considerations mean that any data breach resulting from such attacks could lead to regulatory penalties. The medium severity indicates that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediately upgrade the GeoDirectory plugin to version 2.8.120 or later once available to ensure the vulnerability is patched. 2. Restrict contributor and higher roles to trusted users only, and review user permissions regularly to minimize the risk of malicious insiders or compromised accounts. 3. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting the sources of executable scripts. 4. Employ Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting shortcode attributes. 5. Conduct regular security audits and code reviews of custom shortcodes or plugins that handle user input to ensure proper validation and escaping. 6. Educate site administrators and content managers about the risks of XSS and the importance of sanitizing inputs. 7. Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 8. Consider disabling shortcode usage from untrusted users or implementing additional input sanitization at the application level until patches are applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-06-17T12:44:02.645Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68712038a83201eaacaf28dd
Added to database: 7/11/2025, 2:31:20 PM
Last enriched: 7/11/2025, 2:46:07 PM
Last updated: 7/11/2025, 2:46:07 PM
Views: 2
Related Threats
CVE-2025-7460: Buffer Overflow in TOTOLINK T6
HighCVE-2025-53636: CWE-400: Uncontrolled Resource Consumption in OSC ondemand
MediumCVE-2025-7459: SQL Injection in code-projects Mobile Shop
MediumCVE-2025-7457: SQL Injection in Campcodes Online Movie Theater Seat Reservation System
MediumCVE-2025-52955: CWE-131 Incorrect Calculation of Buffer Size in Juniper Networks Junos OS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.