Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62968: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Sayan Datta WP Last Modified Info

0
Medium
VulnerabilityCVE-2025-62968cvecve-2025-62968
Published: Mon Oct 27 2025 (10/27/2025, 01:34:14 UTC)
Source: CVE Database V5
Vendor/Project: Sayan Datta
Product: WP Last Modified Info

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayan Datta WP Last Modified Info wp-last-modified-info allows Stored XSS.This issue affects WP Last Modified Info: from n/a through <= 1.9.2.

AI-Powered Analysis

AILast updated: 11/13/2025, 12:55:29 UTC

Technical Analysis

CVE-2025-62968 is a stored Cross-site Scripting (XSS) vulnerability identified in the WordPress plugin WP Last Modified Info developed by Sayan Datta. This plugin, which displays the last modified date of posts or pages, improperly neutralizes user-supplied input during the generation of web pages, allowing an attacker to inject malicious JavaScript code that is stored persistently. The vulnerability affects all versions up to and including 1.9.2. Exploitation requires the attacker to have at least low-level privileges (PR:L) and user interaction (UI:R), such as tricking an administrator or editor into viewing a crafted page or post. The attack vector is remote (AV:N), and the vulnerability has a scope change (S:C), meaning the impact extends beyond the vulnerable component. The CVSS v3.1 base score is 6.5, indicating medium severity, with partial impacts on confidentiality, integrity, and availability. While no known exploits are currently reported in the wild, the vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites. The lack of an official patch at the time of publication necessitates immediate attention from site administrators. The vulnerability is particularly relevant for WordPress sites that use this plugin to display modification info, especially those with multiple users or public-facing content where attackers can inject payloads that affect visitors or administrators.

Potential Impact

For European organizations, the impact of CVE-2025-62968 can be significant, especially for those relying on WordPress for their web presence and using the WP Last Modified Info plugin. Successful exploitation can lead to theft of user credentials, session tokens, or other sensitive information, enabling further compromise of the website or internal systems. It can also facilitate website defacement, damage brand reputation, and lead to loss of customer trust. The partial availability impact may cause disruptions in website functionality or user experience. Given the medium severity and requirement for user interaction, the threat is more pronounced in environments with multiple users or where attackers can socially engineer users into triggering the payload. European organizations in sectors such as e-commerce, media, education, and government, which often use WordPress extensively, may face increased risk. Additionally, regulatory frameworks like GDPR impose strict requirements on protecting user data, and exploitation of this vulnerability could lead to compliance violations and fines.

Mitigation Recommendations

1. Monitor official channels and the plugin developer for security updates and apply patches immediately once available. 2. Until a patch is released, consider disabling or removing the WP Last Modified Info plugin if it is not essential. 3. Restrict plugin management and content editing permissions to trusted users only, minimizing the risk of malicious input injection. 4. Implement a Web Application Firewall (WAF) with robust XSS detection and prevention capabilities to block malicious payloads targeting this vulnerability. 5. Conduct regular security audits and code reviews of WordPress plugins and themes to identify and remediate unsafe input handling. 6. Educate administrators and content editors about the risks of clicking on suspicious links or opening untrusted content that could trigger stored XSS. 7. Employ Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script execution sources. 8. Use security plugins that scan for known vulnerabilities and suspicious activity related to XSS attacks. 9. Maintain regular backups of website data to enable quick recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:25:01.200Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed03423a7bbed324acc85

Added to database: 10/27/2025, 1:51:48 AM

Last enriched: 11/13/2025, 12:55:29 PM

Last updated: 12/14/2025, 8:47:57 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats