Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62901: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Tormorten WP Microdata

0
Medium
VulnerabilityCVE-2025-62901cvecve-2025-62901cwe-79
Published: Sun Dec 21 2025 (12/21/2025, 21:11:56 UTC)
Source: CVE Database V5
Vendor/Project: Tormorten
Product: WP Microdata

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:48:24 UTC

Technical Analysis

CVE-2025-62901 identifies a stored cross-site scripting (XSS) vulnerability in the Tormorten WP Microdata WordPress plugin, which is used to add microdata markup to WordPress sites to improve SEO and structured data representation. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, classified under CWE-79. This flaw allows an attacker with at least low-level privileges (PR:L) and requiring user interaction (UI:R) to inject malicious JavaScript code that is stored persistently within the website content. When other users visit the affected pages, the malicious script executes in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect components beyond the initially vulnerable plugin. The impact includes partial loss of confidentiality, integrity, and availability (C:L/I:L/A:L). No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin version affected is up to 1.0, with no specific version range provided. The vulnerability was reserved in October 2025 and published in December 2025, indicating recent discovery.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites using the WP Microdata plugin on WordPress platforms. Exploitation could lead to unauthorized script execution in users' browsers, resulting in theft of session cookies, user credentials, or other sensitive data. This can facilitate further attacks such as account takeover or phishing. The integrity of website content can be compromised, potentially damaging brand reputation and user trust. Availability impacts may include site defacement or redirection, disrupting normal business operations. Given the widespread use of WordPress across Europe, especially among SMEs and content-driven organizations, the threat could affect a significant number of sites if the plugin is in use. The requirement for low privileges and user interaction lowers the barrier for exploitation, increasing risk. However, the absence of known exploits in the wild currently limits immediate impact. Organizations in sectors with high reliance on web presence, such as e-commerce, media, and public services, are particularly vulnerable to reputational and operational damage.

Mitigation Recommendations

1. Monitor for official patches or updates from the Tormorten WP Microdata plugin developers and apply them immediately upon release. 2. If no patch is available, consider disabling or uninstalling the WP Microdata plugin to eliminate the attack surface. 3. Implement strict input validation and sanitization on all user inputs, especially those that are rendered on web pages. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5. Limit user privileges on WordPress sites to the minimum necessary to reduce the risk of low-privilege exploitation. 6. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and themes. 7. Educate site administrators and users about the risks of interacting with suspicious content to reduce successful exploitation via user interaction. 8. Use Web Application Firewalls (WAFs) configured to detect and block common XSS attack patterns targeting WordPress sites. 9. Maintain regular backups of website data to enable quick recovery in case of compromise. 10. Monitor site logs for unusual activities that may indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:23.976Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69486686250e8b2ef81b7a20

Added to database: 12/21/2025, 9:28:38 PM

Last enriched: 1/20/2026, 10:48:24 PM

Last updated: 2/5/2026, 12:04:38 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats