Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67541: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Lester Chan WP-ShowHide

0
High
VulnerabilityCVE-2025-67541cvecve-2025-67541
Published: Tue Dec 09 2025 (12/09/2025, 14:14:05 UTC)
Source: CVE Database V5
Vendor/Project: Lester Chan
Product: WP-ShowHide

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lester Chan WP-ShowHide wp-showhide allows Stored XSS.This issue affects WP-ShowHide: from n/a through <= 1.05.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:54:11 UTC

Technical Analysis

CVE-2025-67541 identifies a stored Cross-site Scripting (XSS) vulnerability in the WP-ShowHide plugin for WordPress, developed by Lester Chan. This vulnerability results from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored persistently within the plugin's data. When other users or administrators view the affected pages, the injected scripts execute in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability affects all versions up to and including 1.05. The CVSS v3.1 base score is 7.1, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability can affect components beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low to moderate (C:L/I:L/A:L), meaning attackers can leak some information, modify content, or cause limited disruption. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered high risk. The lack of an official patch link suggests that a fix may not yet be available, increasing the urgency for mitigation. Stored XSS vulnerabilities are particularly dangerous because they can affect all users visiting the compromised site, including administrators, potentially leading to full site compromise or data theft. The WP-ShowHide plugin is used to toggle visibility of content on WordPress sites, which are widely deployed across Europe, making this vulnerability relevant to many organizations.

Potential Impact

For European organizations, the impact of CVE-2025-67541 can be significant, especially for those relying on WordPress sites with the WP-ShowHide plugin installed. Stored XSS can lead to theft of authentication cookies, enabling attackers to impersonate users or administrators, potentially resulting in unauthorized access to sensitive data or site control. It can also facilitate phishing attacks by injecting malicious content or redirecting users to fraudulent sites, damaging organizational reputation and trust. The integrity of website content can be compromised, affecting customer confidence and compliance with data protection regulations such as GDPR. Availability impacts, while generally limited, can occur if attackers use the vulnerability to inject scripts that disrupt site functionality or cause denial of service. Given the widespread use of WordPress in Europe, including governmental, educational, and commercial sectors, the vulnerability poses a broad risk. Organizations handling personal data or financial transactions are particularly vulnerable to cascading effects from such attacks, including regulatory penalties and financial losses.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify the presence of the WP-ShowHide plugin and its version. Since no official patch link is currently available, administrators should monitor the vendor’s channels for updates and apply patches promptly once released. In the interim, disabling or uninstalling the plugin can eliminate the attack surface. Employing a Web Application Firewall (WAF) with robust XSS filtering rules can help detect and block malicious payloads targeting this vulnerability. Additionally, implementing Content Security Policy (CSP) headers can mitigate the impact of injected scripts by restricting script execution sources. Developers and administrators should review and sanitize all user inputs and outputs related to the plugin, using secure coding practices to neutralize potentially malicious data. Regular security audits and penetration testing focusing on XSS vectors can help identify residual risks. Finally, educating site users and administrators about phishing and suspicious activity can reduce the likelihood of successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:12.170Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833a629cea75c35ae52fb

Added to database: 12/9/2025, 2:35:18 PM

Last enriched: 1/21/2026, 12:54:11 AM

Last updated: 2/5/2026, 1:10:53 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats