CVE-2025-7652: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ndiego Easy Plugin Stats
The Easy Plugin Stats plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'eps' shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-7652 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Plugin Stats plugin for WordPress, affecting all versions up to and including 2.0.1. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the plugin's 'eps' shortcode. Authenticated users with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages where the shortcode is used. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, cookies, or enabling actions on behalf of the victim user. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk. The plugin's widespread use in WordPress sites increases the attack surface, especially where contributor-level access is granted to multiple users. The vulnerability's exploitation does not affect availability but can lead to data leakage and unauthorized actions. The lack of a current patch requires administrators to monitor vendor updates closely or implement temporary mitigations such as restricting contributor privileges or sanitizing inputs at the application level.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web applications using the Easy Plugin Stats plugin. Exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions within the context of the affected WordPress site. This is particularly concerning for organizations with multiple contributors or editors who have authenticated access, as they could be leveraged as entry points. The impact is heightened in sectors relying heavily on WordPress for public-facing or internal portals, such as media, education, and small to medium enterprises. Although availability is not directly impacted, the reputational damage and potential data breaches could have regulatory consequences under GDPR. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed. Organizations with high web traffic and user engagement are more vulnerable to the consequences of session hijacking or defacement resulting from this XSS flaw.
Mitigation Recommendations
1. Monitor the Easy Plugin Stats plugin vendor announcements closely and apply official patches immediately upon release. 2. Until a patch is available, restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the 'eps' shortcode parameters. 4. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected WordPress sites. 5. Conduct regular security audits of user-generated content and shortcode usage to identify and remove potentially malicious inputs. 6. Educate content contributors about safe input practices and the risks of injecting untrusted content. 7. Consider disabling or replacing the Easy Plugin Stats plugin with alternative solutions that follow secure coding practices if immediate patching is not feasible. 8. Employ security plugins that provide input sanitization and output escaping enhancements for WordPress shortcodes. 9. Review and tighten user role permissions to enforce the principle of least privilege, reducing the number of users who can exploit this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7652: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ndiego Easy Plugin Stats
Description
The Easy Plugin Stats plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'eps' shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-7652 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Plugin Stats plugin for WordPress, affecting all versions up to and including 2.0.1. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the plugin's 'eps' shortcode. Authenticated users with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages where the shortcode is used. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, cookies, or enabling actions on behalf of the victim user. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a notable risk. The plugin's widespread use in WordPress sites increases the attack surface, especially where contributor-level access is granted to multiple users. The vulnerability's exploitation does not affect availability but can lead to data leakage and unauthorized actions. The lack of a current patch requires administrators to monitor vendor updates closely or implement temporary mitigations such as restricting contributor privileges or sanitizing inputs at the application level.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web applications using the Easy Plugin Stats plugin. Exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions within the context of the affected WordPress site. This is particularly concerning for organizations with multiple contributors or editors who have authenticated access, as they could be leveraged as entry points. The impact is heightened in sectors relying heavily on WordPress for public-facing or internal portals, such as media, education, and small to medium enterprises. Although availability is not directly impacted, the reputational damage and potential data breaches could have regulatory consequences under GDPR. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed. Organizations with high web traffic and user engagement are more vulnerable to the consequences of session hijacking or defacement resulting from this XSS flaw.
Mitigation Recommendations
1. Monitor the Easy Plugin Stats plugin vendor announcements closely and apply official patches immediately upon release. 2. Until a patch is available, restrict contributor-level access to trusted users only, minimizing the risk of malicious shortcode injection. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the 'eps' shortcode parameters. 4. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected WordPress sites. 5. Conduct regular security audits of user-generated content and shortcode usage to identify and remove potentially malicious inputs. 6. Educate content contributors about safe input practices and the risks of injecting untrusted content. 7. Consider disabling or replacing the Easy Plugin Stats plugin with alternative solutions that follow secure coding practices if immediate patching is not feasible. 8. Employ security plugins that provide input sanitization and output escaping enhancements for WordPress shortcodes. 9. Review and tighten user role permissions to enforce the principle of least privilege, reducing the number of users who can exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-14T17:41:48.754Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ea263d5baaa01f1ca0ffa5
Added to database: 10/11/2025, 9:41:17 AM
Last enriched: 10/11/2025, 9:59:18 AM
Last updated: 10/15/2025, 12:00:25 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54196: URL Redirection to Untrusted Site ('Open Redirect') (CWE-601) in Adobe Adobe Connect
LowCVE-2025-49553: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
CriticalCVE-2025-49552: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
HighCVE-2025-62376: CWE-287: Improper Authentication in pwncollege dojo
CriticalCVE-2025-61797: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.