Skip to main content

CVE-2025-7486: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motovnet Ebook Store

Medium
VulnerabilityCVE-2025-7486cvecve-2025-7486cwe-79
Published: Mon Jul 21 2025 (07/21/2025, 22:21:58 UTC)
Source: CVE Database V5
Vendor/Project: motovnet
Product: Ebook Store

Description

The Ebook Store plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Order Details in all versions up to, and including, 5.8012 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 07/30/2025, 01:33:03 UTC

Technical Analysis

CVE-2025-7486 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the motovnet Ebook Store plugin for WordPress, specifically all versions up to and including 5.8012. The vulnerability arises from improper input sanitization and output escaping in the Order Details functionality. Authenticated attackers with administrator-level privileges can exploit this flaw to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or redirection to malicious sites. The vulnerability is unique in that it only affects WordPress multi-site installations or single-site installations where the unfiltered_html capability has been disabled, limiting the scope of exploitation. The CVSS 3.1 base score is 4.4 (medium), reflecting that the attack requires high privileges (administrator) and no user interaction is needed for exploitation once the malicious script is injected. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently in the wild, and no official patches have been released yet. The vulnerability was reserved on July 11, 2025, and published on July 21, 2025, by Wordfence. Given the nature of WordPress plugins and their widespread use, this vulnerability could be leveraged in targeted attacks against organizations using the motovnet Ebook Store plugin in multi-site environments or with restricted HTML capabilities.

Potential Impact

For European organizations, the impact of this vulnerability depends on the adoption of the motovnet Ebook Store plugin in WordPress multi-site deployments or configurations with disabled unfiltered_html. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of users, or inject malicious content that compromises user trust and data confidentiality. This could result in reputational damage, data breaches, and regulatory non-compliance under GDPR if personal data is exposed. The requirement for administrator-level access limits the risk to insider threats or attackers who have already compromised admin credentials, but the multi-site context increases the potential blast radius, as a single injection could affect multiple sites within the network. European organizations running e-commerce or content distribution platforms on WordPress multi-site setups should be particularly cautious, as attackers could leverage this vulnerability to escalate privileges or pivot within the network. Although no active exploits are reported, the presence of this vulnerability in a widely used CMS plugin necessitates prompt attention to prevent targeted attacks.

Mitigation Recommendations

1. Immediate mitigation involves restricting administrator access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit administrator activities and order details input fields for suspicious or unexpected script content. 3. Temporarily disable or restrict the use of the motovnet Ebook Store plugin in multi-site environments until a patch is available. 4. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the Order Details fields. 5. Encourage the plugin vendor to release a security patch that properly sanitizes and escapes input and output in the affected components. 6. For organizations with development resources, consider applying custom input validation and output encoding as a stopgap measure. 7. Educate administrators about the risks of XSS and the importance of cautious input handling. 8. Regularly update WordPress core and plugins to the latest versions once patches are released to remediate this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-11T14:12:28.372Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687feeee723ca1aca2722c73

Added to database: 7/22/2025, 8:05:02 PM

Last enriched: 7/30/2025, 1:33:03 AM

Last updated: 9/2/2025, 11:16:25 AM

Views: 587

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats