Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68878: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Prasadkirpekar Advanced Custom CSS

0
High
VulnerabilityCVE-2025-68878cvecve-2025-68878cwe-79
Published: Mon Dec 29 2025 (12/29/2025, 16:00:20 UTC)
Source: CVE Database V5
Vendor/Project: Prasadkirpekar
Product: Advanced Custom CSS

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Prasadkirpekar Advanced Custom CSS allows Reflected XSS.This issue affects Advanced Custom CSS: from n/a through 1.1.0.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:44:28 UTC

Technical Analysis

CVE-2025-68878 is a reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in the Prasadkirpekar Advanced Custom CSS plugin for WordPress, affecting versions up to 1.1.0. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing attackers to inject malicious JavaScript code that is reflected back to users. This reflected XSS does not require authentication or elevated privileges but does require user interaction, such as clicking a maliciously crafted URL. The CVSS v3.1 score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component, potentially impacting the entire web application. The impact includes partial loss of confidentiality (e.g., theft of cookies or sensitive data), integrity (e.g., unauthorized actions performed on behalf of users), and availability (e.g., denial of service through script execution). Although no known exploits are currently reported in the wild, the vulnerability is publicly disclosed and could be targeted by attackers. The plugin’s role in customizing CSS dynamically on websites makes it a valuable target, especially for sites with high user traffic. The lack of available patches at the time of disclosure increases the urgency for mitigation through other means. The vulnerability is particularly relevant for organizations relying on WordPress sites that use this plugin for styling and customization, as exploitation could lead to broader compromise of user sessions and data.

Potential Impact

For European organizations, the impact of CVE-2025-68878 can be significant, particularly for those operating customer-facing websites or internal portals using the Advanced Custom CSS plugin. Successful exploitation can lead to session hijacking, unauthorized actions, and data leakage, undermining user trust and potentially violating data protection regulations such as GDPR. The reflected XSS could be used to deliver phishing payloads or malware, increasing the risk of broader compromise. The partial loss of availability could disrupt services, impacting business continuity. Organizations in sectors such as finance, healthcare, e-commerce, and government are especially at risk due to the sensitivity of their data and regulatory requirements. The vulnerability’s ability to affect the entire web application scope means that even a single vulnerable plugin can jeopardize the security of the whole site. Given the high usage of WordPress and related plugins in Europe, the threat landscape is broad. Additionally, the requirement for user interaction means that social engineering could be leveraged to increase exploitation success. The absence of known exploits in the wild currently provides a window for proactive defense, but the risk of rapid weaponization remains.

Mitigation Recommendations

European organizations should take immediate and specific actions to mitigate CVE-2025-68878 beyond generic advice. First, identify all instances of the Prasadkirpekar Advanced Custom CSS plugin in their environments and assess their versions. If updates or patches become available, apply them promptly. In the absence of patches, consider disabling or removing the plugin to eliminate the attack surface. Implement strict input validation and output encoding on all user-supplied data, especially in URL parameters and form inputs that interact with the plugin. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Conduct security awareness training to educate users about the risks of clicking suspicious links, reducing the likelihood of successful exploitation. Employ web application firewalls (WAFs) with rules tuned to detect and block reflected XSS payloads targeting this plugin. Regularly monitor logs and user activity for signs of exploitation attempts. Finally, integrate vulnerability scanning and penetration testing focused on XSS vectors in the development and deployment lifecycle to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-24T14:00:32.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450b7db813ff03e2bf369

Added to database: 12/30/2025, 10:22:47 PM

Last enriched: 1/21/2026, 1:44:28 AM

Last updated: 2/7/2026, 9:22:38 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats