CVE-2025-62968: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sayan Datta WP Last Modified Info
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayan Datta WP Last Modified Info wp-last-modified-info allows Stored XSS.This issue affects WP Last Modified Info: from n/a through <= 1.9.2.
AI Analysis
Technical Summary
CVE-2025-62968 is a stored Cross-site Scripting (XSS) vulnerability identified in the WordPress plugin WP Last Modified Info developed by Sayan Datta. This plugin, which displays the last modified date of posts or pages, improperly neutralizes user-supplied input during the generation of web pages, allowing an attacker to inject malicious JavaScript code that is stored persistently. The vulnerability affects all versions up to and including 1.9.2. Exploitation requires the attacker to have at least low-level privileges (PR:L) and user interaction (UI:R), such as tricking an administrator or editor into viewing a crafted page or post. The attack vector is remote (AV:N), and the vulnerability has a scope change (S:C), meaning the impact extends beyond the vulnerable component. The CVSS v3.1 base score is 6.5, indicating medium severity, with partial impacts on confidentiality, integrity, and availability. While no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites. The lack of an official patch at the time of publication necessitates immediate attention from site administrators. The vulnerability is particularly relevant for WordPress sites that use this plugin to display modification info, especially those with multiple users or public-facing content where attackers can inject payloads that affect visitors or administrators.
Potential Impact
For European organizations, the impact of CVE-2025-62968 can be significant, especially for those relying on WordPress for their web presence and using the WP Last Modified Info plugin. Successful exploitation can lead to theft of user credentials, session tokens, or other sensitive information, enabling further compromise of the website or internal systems. It can also facilitate website defacement, damage brand reputation, and lead to loss of customer trust. The partial availability impact may cause disruptions in website functionality or user experience. Given the medium severity and requirement for user interaction, the threat is more pronounced in environments with multiple users or where attackers can socially engineer users into triggering the payload. European organizations in sectors such as e-commerce, media, education, and government, which often use WordPress extensively, may face increased risk. Additionally, regulatory frameworks like GDPR impose strict requirements on protecting user data, and exploitation of this vulnerability could lead to compliance violations and fines.
Mitigation Recommendations
1. Monitor official channels and the plugin developer for security updates and apply patches immediately once available. 2. Until a patch is released, consider disabling or removing the WP Last Modified Info plugin if it is not essential. 3. Restrict plugin management and content editing permissions to trusted users only, minimizing the risk of malicious input injection. 4. Implement a Web Application Firewall (WAF) with robust XSS detection and prevention capabilities to block malicious payloads targeting this vulnerability. 5. Conduct regular security audits and code reviews of WordPress plugins and themes to identify and remediate unsafe input handling. 6. Educate administrators and content editors about the risks of clicking on suspicious links or opening untrusted content that could trigger stored XSS. 7. Employ Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script execution sources. 8. Use security plugins that scan for known vulnerabilities and suspicious activity related to XSS attacks. 9. Maintain regular backups of website data to enable quick recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-62968: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sayan Datta WP Last Modified Info
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayan Datta WP Last Modified Info wp-last-modified-info allows Stored XSS.This issue affects WP Last Modified Info: from n/a through <= 1.9.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-62968 is a stored Cross-site Scripting (XSS) vulnerability identified in the WordPress plugin WP Last Modified Info developed by Sayan Datta. This plugin, which displays the last modified date of posts or pages, improperly neutralizes user-supplied input during the generation of web pages, allowing an attacker to inject malicious JavaScript code that is stored persistently. The vulnerability affects all versions up to and including 1.9.2. Exploitation requires the attacker to have at least low-level privileges (PR:L) and user interaction (UI:R), such as tricking an administrator or editor into viewing a crafted page or post. The attack vector is remote (AV:N), and the vulnerability has a scope change (S:C), meaning the impact extends beyond the vulnerable component. The CVSS v3.1 base score is 6.5, indicating medium severity, with partial impacts on confidentiality, integrity, and availability. While no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites. The lack of an official patch at the time of publication necessitates immediate attention from site administrators. The vulnerability is particularly relevant for WordPress sites that use this plugin to display modification info, especially those with multiple users or public-facing content where attackers can inject payloads that affect visitors or administrators.
Potential Impact
For European organizations, the impact of CVE-2025-62968 can be significant, especially for those relying on WordPress for their web presence and using the WP Last Modified Info plugin. Successful exploitation can lead to theft of user credentials, session tokens, or other sensitive information, enabling further compromise of the website or internal systems. It can also facilitate website defacement, damage brand reputation, and lead to loss of customer trust. The partial availability impact may cause disruptions in website functionality or user experience. Given the medium severity and requirement for user interaction, the threat is more pronounced in environments with multiple users or where attackers can socially engineer users into triggering the payload. European organizations in sectors such as e-commerce, media, education, and government, which often use WordPress extensively, may face increased risk. Additionally, regulatory frameworks like GDPR impose strict requirements on protecting user data, and exploitation of this vulnerability could lead to compliance violations and fines.
Mitigation Recommendations
1. Monitor official channels and the plugin developer for security updates and apply patches immediately once available. 2. Until a patch is released, consider disabling or removing the WP Last Modified Info plugin if it is not essential. 3. Restrict plugin management and content editing permissions to trusted users only, minimizing the risk of malicious input injection. 4. Implement a Web Application Firewall (WAF) with robust XSS detection and prevention capabilities to block malicious payloads targeting this vulnerability. 5. Conduct regular security audits and code reviews of WordPress plugins and themes to identify and remediate unsafe input handling. 6. Educate administrators and content editors about the risks of clicking on suspicious links or opening untrusted content that could trigger stored XSS. 7. Employ Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script execution sources. 8. Use security plugins that scan for known vulnerabilities and suspicious activity related to XSS attacks. 9. Maintain regular backups of website data to enable quick recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-24T14:25:01.200Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fed03423a7bbed324acc85
Added to database: 10/27/2025, 1:51:48 AM
Last enriched: 11/13/2025, 12:55:29 PM
Last updated: 12/14/2025, 8:47:57 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumCVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14648: Command Injection in DedeBIZ
MediumCVE-2025-14647: SQL Injection in code-projects Computer Book Store
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.