CVE-2025-62968: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sayan Datta WP Last Modified Info
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayan Datta WP Last Modified Info wp-last-modified-info allows Stored XSS.This issue affects WP Last Modified Info: from n/a through <= 1.9.2.
AI Analysis
Technical Summary
CVE-2025-62968 is a stored Cross-site Scripting (XSS) vulnerability identified in the WordPress plugin 'WP Last Modified Info' developed by Sayan Datta. This plugin, which displays the last modified date of posts or pages, improperly neutralizes user input during web page generation, allowing malicious scripts to be stored and executed in the context of the victim's browser. The vulnerability affects all versions up to and including 1.9.2. The attack vector requires network access (remote), low attack complexity, and low privileges (authenticated user), with user interaction necessary to trigger the malicious payload. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as attackers can execute arbitrary scripts that may steal session tokens, manipulate page content, or perform actions on behalf of the user. The CVSS v3.1 base score is 6.5, indicating medium severity, with a scope change (S:C) meaning the vulnerability affects components beyond the initially vulnerable component. No known exploits have been reported in the wild as of the publication date (October 27, 2025). The vulnerability is particularly concerning for websites that allow user-generated content or have multiple authenticated users, as attackers with low privileges can inject persistent malicious code that affects other users or administrators. The lack of an official patch link suggests that remediation is pending or must be manually applied by plugin developers or site administrators.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on WordPress websites with the WP Last Modified Info plugin installed. Exploitation could lead to session hijacking, defacement, or unauthorized actions performed by attackers impersonating legitimate users, potentially compromising sensitive data or disrupting services. Public-facing websites, e-commerce platforms, and portals with multiple authenticated users are particularly vulnerable. The medium severity score reflects the balance between the need for authentication and user interaction and the potential impact on confidentiality, integrity, and availability. Given the widespread use of WordPress across Europe, especially in countries with large digital economies, the threat could affect a significant number of organizations if not addressed promptly. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the network or to spread malware.
Mitigation Recommendations
1. Monitor for official patches or updates from the plugin developer and apply them immediately once available. 2. In the absence of an official patch, implement manual code reviews and sanitize all user inputs related to the plugin, ensuring proper escaping and encoding before output. 3. Employ a strict Content Security Policy (CSP) to restrict the execution of unauthorized scripts on affected web pages. 4. Limit plugin usage to trusted users and restrict permissions to reduce the risk of malicious input submission. 5. Regularly audit WordPress plugins and remove or replace those that are outdated or no longer maintained. 6. Use Web Application Firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the plugin. 7. Educate site administrators and users about the risks of XSS and encourage cautious behavior regarding suspicious links or inputs. 8. Conduct periodic security assessments and penetration testing focusing on web application vulnerabilities, including stored XSS.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-62968: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sayan Datta WP Last Modified Info
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayan Datta WP Last Modified Info wp-last-modified-info allows Stored XSS.This issue affects WP Last Modified Info: from n/a through <= 1.9.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-62968 is a stored Cross-site Scripting (XSS) vulnerability identified in the WordPress plugin 'WP Last Modified Info' developed by Sayan Datta. This plugin, which displays the last modified date of posts or pages, improperly neutralizes user input during web page generation, allowing malicious scripts to be stored and executed in the context of the victim's browser. The vulnerability affects all versions up to and including 1.9.2. The attack vector requires network access (remote), low attack complexity, and low privileges (authenticated user), with user interaction necessary to trigger the malicious payload. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as attackers can execute arbitrary scripts that may steal session tokens, manipulate page content, or perform actions on behalf of the user. The CVSS v3.1 base score is 6.5, indicating medium severity, with a scope change (S:C) meaning the vulnerability affects components beyond the initially vulnerable component. No known exploits have been reported in the wild as of the publication date (October 27, 2025). The vulnerability is particularly concerning for websites that allow user-generated content or have multiple authenticated users, as attackers with low privileges can inject persistent malicious code that affects other users or administrators. The lack of an official patch link suggests that remediation is pending or must be manually applied by plugin developers or site administrators.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on WordPress websites with the WP Last Modified Info plugin installed. Exploitation could lead to session hijacking, defacement, or unauthorized actions performed by attackers impersonating legitimate users, potentially compromising sensitive data or disrupting services. Public-facing websites, e-commerce platforms, and portals with multiple authenticated users are particularly vulnerable. The medium severity score reflects the balance between the need for authentication and user interaction and the potential impact on confidentiality, integrity, and availability. Given the widespread use of WordPress across Europe, especially in countries with large digital economies, the threat could affect a significant number of organizations if not addressed promptly. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the network or to spread malware.
Mitigation Recommendations
1. Monitor for official patches or updates from the plugin developer and apply them immediately once available. 2. In the absence of an official patch, implement manual code reviews and sanitize all user inputs related to the plugin, ensuring proper escaping and encoding before output. 3. Employ a strict Content Security Policy (CSP) to restrict the execution of unauthorized scripts on affected web pages. 4. Limit plugin usage to trusted users and restrict permissions to reduce the risk of malicious input submission. 5. Regularly audit WordPress plugins and remove or replace those that are outdated or no longer maintained. 6. Use Web Application Firewalls (WAFs) configured to detect and block common XSS attack patterns targeting the plugin. 7. Educate site administrators and users about the risks of XSS and encourage cautious behavior regarding suspicious links or inputs. 8. Conduct periodic security assessments and penetration testing focusing on web application vulnerabilities, including stored XSS.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-24T14:25:01.200Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fed03423a7bbed324acc85
Added to database: 10/27/2025, 1:51:48 AM
Last enriched: 1/20/2026, 11:06:22 PM
Last updated: 2/7/2026, 6:54:12 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.