Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67964: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in favethemes Homey Core

0
High
VulnerabilityCVE-2025-67964cvecve-2025-67964
Published: Thu Jan 22 2026 (01/22/2026, 16:51:58 UTC)
Source: CVE Database V5
Vendor/Project: favethemes
Product: Homey Core

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in favethemes Homey Core homey-core allows Reflected XSS.This issue affects Homey Core: from n/a through <= 2.4.3.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:39:48 UTC

Technical Analysis

CVE-2025-67964 is a reflected Cross-site Scripting (XSS) vulnerability identified in the favethemes Homey Core WordPress plugin, specifically in versions up to 2.4.3. This vulnerability stems from improper neutralization of input during web page generation, meaning that user-supplied data is not adequately sanitized or encoded before being included in dynamically generated web pages. As a result, an attacker can craft a malicious URL or input that, when visited or submitted by a victim, causes the victim's browser to execute arbitrary JavaScript code controlled by the attacker. This reflected XSS does not require prior authentication but does require the victim to interact with a malicious link or input vector. The vulnerability affects the confidentiality, integrity, and availability of affected systems by enabling attacks such as session hijacking, credential theft, defacement, or redirection to malicious sites. The CVSS v3.1 score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) indicates a high severity with network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change that can impact multiple components. Although no known exploits are currently in the wild, the presence of this vulnerability in a popular WordPress plugin used for real estate and booking websites means it poses a tangible risk. The lack of available patches at the time of publication necessitates immediate mitigation efforts by administrators. Given the widespread use of WordPress and favethemes products in Europe, this vulnerability could be leveraged to target European organizations' websites, potentially leading to data breaches or reputational damage.

Potential Impact

For European organizations, the impact of CVE-2025-67964 can be significant, especially for those relying on the Homey Core plugin for their websites, such as real estate agencies, booking platforms, or service providers. Exploitation could lead to unauthorized access to user sessions, theft of sensitive customer data, and manipulation of website content, undermining user trust and compliance with data protection regulations like GDPR. The reflected XSS could also facilitate phishing attacks by injecting malicious scripts that redirect users to fraudulent sites. Additionally, the scope change indicated in the CVSS vector suggests that the vulnerability could affect multiple components or users beyond the initial point of compromise, amplifying the potential damage. Disruption of availability through defacement or script-based denial of service could also impact business continuity. Given the high adoption of WordPress and related plugins in European digital ecosystems, the threat surface is broad, and organizations may face regulatory and financial consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2025-67964 effectively, European organizations should: 1) Immediately check for and apply any official patches or updates from favethemes once available; 2) If patches are not yet released, implement Web Application Firewall (WAF) rules to detect and block typical reflected XSS payloads targeting Homey Core endpoints; 3) Employ strict input validation and output encoding on all user-supplied data within the application or via custom code overrides; 4) Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of injected code; 5) Conduct security awareness training for users to recognize suspicious links and avoid clicking untrusted URLs; 6) Monitor web server and application logs for unusual request patterns indicative of exploitation attempts; 7) Consider temporary disabling or replacing the Homey Core plugin if immediate patching is not feasible; 8) Engage in regular security assessments and penetration testing focused on XSS vulnerabilities; 9) Coordinate with incident response teams to prepare for potential exploitation scenarios; 10) Ensure compliance with GDPR by documenting mitigation steps and breach response plans.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:23.852Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259174623b1157c7faec7

Added to database: 1/22/2026, 5:06:31 PM

Last enriched: 1/30/2026, 8:39:48 AM

Last updated: 2/5/2026, 7:45:16 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats