Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7652: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ndiego Easy Plugin Stats

0
Medium
VulnerabilityCVE-2025-7652cvecve-2025-7652cwe-79
Published: Sat Oct 11 2025 (10/11/2025, 09:28:37 UTC)
Source: CVE Database V5
Vendor/Project: ndiego
Product: Easy Plugin Stats

Description

The Easy Plugin Stats plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'eps' shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 10/11/2025, 09:59:18 UTC

Technical Analysis

CVE-2025-7652 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Plugin Stats plugin for WordPress, affecting all versions up to and including 2.0.1. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the plugin's 'eps' shortcode. Authenticated users with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages where the shortcode is used. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, cookies, or enabling actions on behalf of the victim user. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk. The plugin's widespread use in WordPress sites increases the attack surface, especially where contributor-level access is granted to multiple users. The vulnerability's exploitation does not affect availability but can lead to data leakage and unauthorized actions. The lack of a current patch requires administrators to monitor vendor updates closely or implement temporary mitigations such as restricting contributor privileges or sanitizing inputs at the application level.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web applications using the Easy Plugin Stats plugin. Exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions within the context of the affected WordPress site. This is particularly concerning for organizations with multiple contributors or editors who have authenticated access, as they could be leveraged as entry points. The impact is heightened in sectors relying heavily on WordPress for public-facing or internal portals, such as media, education, and small to medium enterprises. Although availability is not directly impacted, the reputational damage and potential data breaches could have regulatory consequences under GDPR. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed. Organizations with high web traffic and user engagement are more vulnerable to the consequences of session hijacking or defacement resulting from this XSS flaw.

Mitigation Recommendations

1. Monitor the Easy Plugin Stats plugin vendor announcements closely and apply official patches immediately upon release. 2. Until a patch is available, restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the 'eps' shortcode parameters. 4. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected WordPress sites. 5. Conduct regular security audits of user-generated content and shortcode usage to identify and remove potentially malicious inputs. 6. Educate content contributors about safe input practices and the risks of injecting untrusted content. 7. Consider disabling or replacing the Easy Plugin Stats plugin with alternative solutions that follow secure coding practices if immediate patching is not feasible. 8. Employ security plugins that provide input sanitization and output escaping enhancements for WordPress shortcodes. 9. Review and tighten user role permissions to enforce the principle of least privilege, reducing the number of users who can exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-14T17:41:48.754Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea263d5baaa01f1ca0ffa5

Added to database: 10/11/2025, 9:41:17 AM

Last enriched: 10/11/2025, 9:59:18 AM

Last updated: 10/15/2025, 12:00:25 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats