CVE-2025-67952: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ThemeGoods Grand Tour
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Grand Tour grandtour allows Reflected XSS.This issue affects Grand Tour: from n/a through < 5.6.2.
AI Analysis
Technical Summary
CVE-2025-67952 is a reflected Cross-site Scripting (XSS) vulnerability identified in the ThemeGoods Grand Tour WordPress plugin, affecting all versions prior to 5.6.2. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing attackers to inject malicious scripts that are reflected back to users. This flaw does not require authentication but does require user interaction, such as clicking a crafted link. The CVSS 3.1 base score of 7.1 indicates a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and user interaction needed (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L), potentially enabling session hijacking, theft of sensitive information, or manipulation of web content. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a viable target for attackers aiming to compromise websites using the Grand Tour plugin. The issue was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure. No official patches or exploit code links are provided in the data, but upgrading to version 5.6.2 or later is implied as the remediation path. The vulnerability is particularly relevant for websites relying on the Grand Tour plugin for content presentation and user interaction, as exploitation could undermine user trust and site integrity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications utilizing the ThemeGoods Grand Tour plugin. Exploitation can lead to unauthorized script execution in users' browsers, resulting in session hijacking, credential theft, or redirection to malicious sites, thereby compromising confidentiality and integrity. The reflected XSS can also facilitate phishing attacks or defacement, damaging organizational reputation. Availability impact, while limited, could occur if injected scripts disrupt normal site functionality. Given the widespread use of WordPress and its plugins across Europe, organizations in sectors such as e-commerce, media, education, and government are particularly vulnerable. The vulnerability's network accessibility and lack of required privileges increase the attack surface, making it easier for attackers to target European entities remotely. Failure to remediate promptly could lead to data breaches, regulatory non-compliance (e.g., GDPR), and financial losses. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains high.
Mitigation Recommendations
1. Immediate upgrade of the ThemeGoods Grand Tour plugin to version 5.6.2 or later, where the vulnerability is fixed. 2. Deploy Web Application Firewalls (WAFs) with robust XSS filtering rules to detect and block malicious payloads targeting this vulnerability. 3. Conduct thorough input validation and output encoding audits on all user-supplied data processed by the plugin or related components. 4. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5. Educate users and administrators about the risks of clicking suspicious links and encourage reporting of unusual site behavior. 6. Monitor web server and application logs for anomalous requests that may indicate exploitation attempts. 7. For organizations unable to immediately patch, consider temporarily disabling the plugin or restricting access to affected pages. 8. Coordinate with hosting providers to ensure security controls are in place and updated. 9. Regularly review and update incident response plans to address potential XSS exploitation scenarios. These measures, combined, provide a layered defense to mitigate the risk posed by CVE-2025-67952.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-67952: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ThemeGoods Grand Tour
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Grand Tour grandtour allows Reflected XSS.This issue affects Grand Tour: from n/a through < 5.6.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-67952 is a reflected Cross-site Scripting (XSS) vulnerability identified in the ThemeGoods Grand Tour WordPress plugin, affecting all versions prior to 5.6.2. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing attackers to inject malicious scripts that are reflected back to users. This flaw does not require authentication but does require user interaction, such as clicking a crafted link. The CVSS 3.1 base score of 7.1 indicates a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and user interaction needed (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L), potentially enabling session hijacking, theft of sensitive information, or manipulation of web content. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a viable target for attackers aiming to compromise websites using the Grand Tour plugin. The issue was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure. No official patches or exploit code links are provided in the data, but upgrading to version 5.6.2 or later is implied as the remediation path. The vulnerability is particularly relevant for websites relying on the Grand Tour plugin for content presentation and user interaction, as exploitation could undermine user trust and site integrity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications utilizing the ThemeGoods Grand Tour plugin. Exploitation can lead to unauthorized script execution in users' browsers, resulting in session hijacking, credential theft, or redirection to malicious sites, thereby compromising confidentiality and integrity. The reflected XSS can also facilitate phishing attacks or defacement, damaging organizational reputation. Availability impact, while limited, could occur if injected scripts disrupt normal site functionality. Given the widespread use of WordPress and its plugins across Europe, organizations in sectors such as e-commerce, media, education, and government are particularly vulnerable. The vulnerability's network accessibility and lack of required privileges increase the attack surface, making it easier for attackers to target European entities remotely. Failure to remediate promptly could lead to data breaches, regulatory non-compliance (e.g., GDPR), and financial losses. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains high.
Mitigation Recommendations
1. Immediate upgrade of the ThemeGoods Grand Tour plugin to version 5.6.2 or later, where the vulnerability is fixed. 2. Deploy Web Application Firewalls (WAFs) with robust XSS filtering rules to detect and block malicious payloads targeting this vulnerability. 3. Conduct thorough input validation and output encoding audits on all user-supplied data processed by the plugin or related components. 4. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5. Educate users and administrators about the risks of clicking suspicious links and encourage reporting of unusual site behavior. 6. Monitor web server and application logs for anomalous requests that may indicate exploitation attempts. 7. For organizations unable to immediately patch, consider temporarily disabling the plugin or restricting access to affected pages. 8. Coordinate with hosting providers to ensure security controls are in place and updated. 9. Regularly review and update incident response plans to address potential XSS exploitation scenarios. These measures, combined, provide a layered defense to mitigate the risk posed by CVE-2025-67952.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-15T10:00:16.552Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697259154623b1157c7fae80
Added to database: 1/22/2026, 5:06:29 PM
Last enriched: 1/30/2026, 8:33:42 AM
Last updated: 2/8/2026, 4:39:57 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2133: Unrestricted Upload in code-projects Online Music Site
MediumCVE-2026-2132: SQL Injection in code-projects Online Music Site
MediumCVE-2026-2131: OS Command Injection in XixianLiang HarmonyOS-mcp-server
MediumCVE-2026-2130: Command Injection in BurtTheCoder mcp-maigret
MediumCVE-2026-2209: Improper Authorization in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.