CVE-2025-68077: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Select-Themes Stockholm
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Select-Themes Stockholm stockholm allows Stored XSS.This issue affects Stockholm: from n/a through <= 9.14.1.
AI Analysis
Technical Summary
CVE-2025-68077 is a stored cross-site scripting (XSS) vulnerability identified in the Select-Themes Stockholm WordPress theme, affecting versions up to 9.14.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious scripts that are stored persistently on the server. When other users visit the compromised pages, the injected scripts execute in their browsers within the security context of the affected site. This can lead to theft of authentication cookies, session tokens, or other sensitive information, as well as unauthorized actions performed on behalf of the victim user. Stored XSS is particularly dangerous because the malicious payload is served to every visitor of the infected page without requiring repeated exploitation. Although no known exploits have been reported in the wild yet, the vulnerability is publicly disclosed and could be targeted by attackers once details become widely available. The lack of an official patch at the time of disclosure means that affected sites remain vulnerable until updates are released and applied. The vulnerability affects a widely used commercial WordPress theme, which is popular among businesses and content creators for its design and functionality. The absence of a CVSS score requires an independent severity assessment based on the vulnerability’s characteristics and potential impact.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web applications built on WordPress using the Stockholm theme. Attackers exploiting this stored XSS can hijack user sessions, deface websites, or redirect users to malicious domains, undermining trust and potentially causing reputational damage. Organizations handling sensitive customer data or providing critical services through affected sites could face data breaches or compliance violations under GDPR. The persistent nature of stored XSS means that even casual visitors or employees accessing the site could be compromised, increasing the attack surface. Additionally, attackers might leverage this vulnerability as a foothold for further attacks within the corporate network if internal users access the compromised site. The impact on availability is generally low but could be elevated if attackers use the vulnerability to inject disruptive scripts or malware. Overall, the threat could disrupt business operations, erode customer confidence, and lead to financial losses due to remediation costs and potential regulatory fines.
Mitigation Recommendations
Organizations should monitor Select-Themes’ official channels for patches addressing CVE-2025-68077 and apply updates promptly once available. Until a patch is released, administrators should implement strict input validation and sanitization on all user inputs, especially those that are rendered on web pages. Employing a robust Content Security Policy (CSP) can help mitigate the impact by restricting the execution of unauthorized scripts. Web application firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Regular security audits and code reviews of customizations to the Stockholm theme should be conducted to identify and remediate unsafe coding practices. User education on phishing and suspicious links can reduce the risk of exploitation via social engineering. Backup procedures should be verified to ensure rapid recovery in case of compromise. Finally, organizations should consider isolating critical systems and limiting administrative access to reduce the potential damage from successful exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-68077: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Select-Themes Stockholm
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Select-Themes Stockholm stockholm allows Stored XSS.This issue affects Stockholm: from n/a through <= 9.14.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-68077 is a stored cross-site scripting (XSS) vulnerability identified in the Select-Themes Stockholm WordPress theme, affecting versions up to 9.14.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows attackers to inject malicious scripts that are stored persistently on the server. When other users visit the compromised pages, the injected scripts execute in their browsers within the security context of the affected site. This can lead to theft of authentication cookies, session tokens, or other sensitive information, as well as unauthorized actions performed on behalf of the victim user. Stored XSS is particularly dangerous because the malicious payload is served to every visitor of the infected page without requiring repeated exploitation. Although no known exploits have been reported in the wild yet, the vulnerability is publicly disclosed and could be targeted by attackers once details become widely available. The lack of an official patch at the time of disclosure means that affected sites remain vulnerable until updates are released and applied. The vulnerability affects a widely used commercial WordPress theme, which is popular among businesses and content creators for its design and functionality. The absence of a CVSS score requires an independent severity assessment based on the vulnerability’s characteristics and potential impact.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web applications built on WordPress using the Stockholm theme. Attackers exploiting this stored XSS can hijack user sessions, deface websites, or redirect users to malicious domains, undermining trust and potentially causing reputational damage. Organizations handling sensitive customer data or providing critical services through affected sites could face data breaches or compliance violations under GDPR. The persistent nature of stored XSS means that even casual visitors or employees accessing the site could be compromised, increasing the attack surface. Additionally, attackers might leverage this vulnerability as a foothold for further attacks within the corporate network if internal users access the compromised site. The impact on availability is generally low but could be elevated if attackers use the vulnerability to inject disruptive scripts or malware. Overall, the threat could disrupt business operations, erode customer confidence, and lead to financial losses due to remediation costs and potential regulatory fines.
Mitigation Recommendations
Organizations should monitor Select-Themes’ official channels for patches addressing CVE-2025-68077 and apply updates promptly once available. Until a patch is released, administrators should implement strict input validation and sanitization on all user inputs, especially those that are rendered on web pages. Employing a robust Content Security Policy (CSP) can help mitigate the impact by restricting the execution of unauthorized scripts. Web application firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Regular security audits and code reviews of customizations to the Stockholm theme should be conducted to identify and remediate unsafe coding practices. User education on phishing and suspicious links can reduce the risk of exploitation via social engineering. Backup procedures should be verified to ensure rapid recovery in case of compromise. Finally, organizations should consider isolating critical systems and limiting administrative access to reduce the potential damage from successful exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-15T10:01:24.073Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69411756594e45819d70d84a
Added to database: 12/16/2025, 8:24:54 AM
Last enriched: 12/16/2025, 8:51:55 AM
Last updated: 12/18/2025, 3:12:10 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.