Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68077: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Select-Themes Stockholm

0
Medium
VulnerabilityCVE-2025-68077cvecve-2025-68077
Published: Tue Dec 16 2025 (12/16/2025, 08:13:04 UTC)
Source: CVE Database V5
Vendor/Project: Select-Themes
Product: Stockholm

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Select-Themes Stockholm stockholm allows Stored XSS.This issue affects Stockholm: from n/a through <= 9.14.1.

AI-Powered Analysis

AILast updated: 12/16/2025, 08:51:55 UTC

Technical Analysis

CVE-2025-68077 is a stored cross-site scripting (XSS) vulnerability identified in the Select-Themes Stockholm WordPress theme, affecting versions up to 9.14.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious scripts that are stored persistently on the server. When other users visit the compromised pages, the injected scripts execute in their browsers within the security context of the affected site. This can lead to theft of authentication cookies, session tokens, or other sensitive information, as well as unauthorized actions performed on behalf of the victim user. Stored XSS is particularly dangerous because the malicious payload is served to every visitor of the infected page without requiring repeated exploitation. Although no known exploits have been reported in the wild yet, the vulnerability is publicly disclosed and could be targeted by attackers once details become widely available. The lack of an official patch at the time of disclosure means that affected sites remain vulnerable until updates are released and applied. The vulnerability affects a widely used commercial WordPress theme, which is popular among businesses and content creators for its design and functionality. The absence of a CVSS score requires an independent severity assessment based on the vulnerability’s characteristics and potential impact.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web applications built on WordPress using the Stockholm theme. Attackers exploiting this stored XSS can hijack user sessions, deface websites, or redirect users to malicious domains, undermining trust and potentially causing reputational damage. Organizations handling sensitive customer data or providing critical services through affected sites could face data breaches or compliance violations under GDPR. The persistent nature of stored XSS means that even casual visitors or employees accessing the site could be compromised, increasing the attack surface. Additionally, attackers might leverage this vulnerability as a foothold for further attacks within the corporate network if internal users access the compromised site. The impact on availability is generally low but could be elevated if attackers use the vulnerability to inject disruptive scripts or malware. Overall, the threat could disrupt business operations, erode customer confidence, and lead to financial losses due to remediation costs and potential regulatory fines.

Mitigation Recommendations

Organizations should monitor Select-Themes’ official channels for patches addressing CVE-2025-68077 and apply updates promptly once available. Until a patch is released, administrators should implement strict input validation and sanitization on all user inputs, especially those that are rendered on web pages. Employing a robust Content Security Policy (CSP) can help mitigate the impact by restricting the execution of unauthorized scripts. Web application firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Regular security audits and code reviews of customizations to the Stockholm theme should be conducted to identify and remediate unsafe coding practices. User education on phishing and suspicious links can reduce the risk of exploitation via social engineering. Backup procedures should be verified to ensure rapid recovery in case of compromise. Finally, organizations should consider isolating critical systems and limiting administrative access to reduce the potential damage from successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:01:24.073Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69411756594e45819d70d84a

Added to database: 12/16/2025, 8:24:54 AM

Last enriched: 12/16/2025, 8:51:55 AM

Last updated: 12/18/2025, 3:12:10 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats