Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67952: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ThemeGoods Grand Tour

0
High
VulnerabilityCVE-2025-67952cvecve-2025-67952
Published: Thu Jan 22 2026 (01/22/2026, 16:51:55 UTC)
Source: CVE Database V5
Vendor/Project: ThemeGoods
Product: Grand Tour

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Grand Tour grandtour allows Reflected XSS.This issue affects Grand Tour: from n/a through < 5.6.2.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:33:42 UTC

Technical Analysis

CVE-2025-67952 is a reflected Cross-site Scripting (XSS) vulnerability identified in the ThemeGoods Grand Tour WordPress plugin, affecting all versions prior to 5.6.2. The vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing attackers to inject malicious scripts that are reflected back to users. This flaw does not require authentication but does require user interaction, such as clicking a crafted link. The CVSS 3.1 base score of 7.1 indicates a high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and user interaction needed (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L), potentially enabling session hijacking, theft of sensitive information, or manipulation of web content. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a viable target for attackers aiming to compromise websites using the Grand Tour plugin. The issue was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure. No official patches or exploit code links are provided in the data, but upgrading to version 5.6.2 or later is implied as the remediation path. The vulnerability is particularly relevant for websites relying on the Grand Tour plugin for content presentation and user interaction, as exploitation could undermine user trust and site integrity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web applications utilizing the ThemeGoods Grand Tour plugin. Exploitation can lead to unauthorized script execution in users' browsers, resulting in session hijacking, credential theft, or redirection to malicious sites, thereby compromising confidentiality and integrity. The reflected XSS can also facilitate phishing attacks or defacement, damaging organizational reputation. Availability impact, while limited, could occur if injected scripts disrupt normal site functionality. Given the widespread use of WordPress and its plugins across Europe, organizations in sectors such as e-commerce, media, education, and government are particularly vulnerable. The vulnerability's network accessibility and lack of required privileges increase the attack surface, making it easier for attackers to target European entities remotely. Failure to remediate promptly could lead to data breaches, regulatory non-compliance (e.g., GDPR), and financial losses. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains high.

Mitigation Recommendations

1. Immediate upgrade of the ThemeGoods Grand Tour plugin to version 5.6.2 or later, where the vulnerability is fixed. 2. Deploy Web Application Firewalls (WAFs) with robust XSS filtering rules to detect and block malicious payloads targeting this vulnerability. 3. Conduct thorough input validation and output encoding audits on all user-supplied data processed by the plugin or related components. 4. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5. Educate users and administrators about the risks of clicking suspicious links and encourage reporting of unusual site behavior. 6. Monitor web server and application logs for anomalous requests that may indicate exploitation attempts. 7. For organizations unable to immediately patch, consider temporarily disabling the plugin or restricting access to affected pages. 8. Coordinate with hosting providers to ensure security controls are in place and updated. 9. Regularly review and update incident response plans to address potential XSS exploitation scenarios. These measures, combined, provide a layered defense to mitigate the risk posed by CVE-2025-67952.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:16.552Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259154623b1157c7fae80

Added to database: 1/22/2026, 5:06:29 PM

Last enriched: 1/30/2026, 8:33:42 AM

Last updated: 2/8/2026, 4:39:57 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats