Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WP for church Sermon Manager

0
Medium
VulnerabilityCVE-2025-63000cvecve-2025-63000cwe-79
Published: Wed Dec 31 2025 (12/31/2025, 08:50:23 UTC)
Source: CVE Database V5
Vendor/Project: WP for church
Product: Sermon Manager

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP for church Sermon Manager allows Stored XSS.This issue affects Sermon Manager: from n/a through 2.30.0.

AI-Powered Analysis

AILast updated: 01/07/2026, 23:06:57 UTC

Technical Analysis

CVE-2025-63000 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the WordPress plugin 'Sermon Manager' developed by WP for church. This plugin is used to manage and display sermons on WordPress websites, commonly by religious organizations. The vulnerability results from improper neutralization of user-supplied input during web page generation, allowing an attacker with low privileges (PR:L) to inject malicious scripts that are stored persistently. When other users or administrators view the affected pages, the malicious script executes in their browsers, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R), and impacting confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. This vulnerability is particularly relevant for WordPress sites running Sermon Manager up to version 2.30.0, which are often used by churches and religious communities to publish sermons online.

Potential Impact

For European organizations, especially religious institutions and community websites using the Sermon Manager plugin, this vulnerability poses a risk of malicious script injection that can compromise user sessions, steal sensitive information, or deface websites. The impact includes potential loss of confidentiality due to session hijacking, integrity violations through unauthorized content modification, and availability disruptions if malicious scripts cause denial of service or redirect users to harmful sites. Given the medium severity and requirement for low privileges and user interaction, attackers could exploit this vulnerability to target site administrators or regular users, potentially leading to broader compromise of the website and its users. This could damage organizational reputation, erode user trust, and lead to compliance issues under European data protection regulations such as GDPR if personal data is exposed or mishandled.

Mitigation Recommendations

European organizations should immediately review user roles and permissions within their WordPress installations to minimize the number of users with privileges that allow content submission or editing. Implement strict input validation and sanitization on all user-generated content fields, especially those handled by the Sermon Manager plugin. Employ Web Application Firewalls (WAFs) with rules targeting XSS attack patterns to detect and block malicious payloads. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. Educate site administrators and users about the risks of clicking on suspicious links or interacting with untrusted content. Prepare to apply patches or updates from the vendor as soon as they become available. Additionally, consider isolating the plugin's functionality or disabling it temporarily if feasible until a fix is released. Conduct regular security audits and penetration testing focused on plugin vulnerabilities to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:25:26.406Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955a05adb813ff03e045dd1

Added to database: 12/31/2025, 10:14:50 PM

Last enriched: 1/7/2026, 11:06:57 PM

Last updated: 1/8/2026, 7:22:11 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats