CVE-2025-7653: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vloo EPay.bg Payments
The EPay.bg Payments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'epay' shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-7653 is a stored Cross-Site Scripting (XSS) vulnerability affecting the EPay.bg Payments plugin for WordPress, developed by vloo. This vulnerability exists in all versions up to and including 0.1 of the plugin. The root cause is insufficient sanitization and output escaping of user-supplied attributes in the plugin's 'epay' shortcode, which is used to embed payment functionalities within WordPress pages. Because the vulnerability is stored XSS, malicious scripts injected by an attacker are saved on the server and executed whenever any user accesses the compromised page. Exploitation requires the attacker to have at least contributor-level authenticated access to the WordPress site, enabling them to inject arbitrary JavaScript code via shortcode attributes. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, privileges required, no user interaction, and a scope change with limited confidentiality and integrity impact but no availability impact. This vulnerability can lead to session hijacking, defacement, or redirection attacks, compromising user data and site integrity. No public exploits are known at this time, and no patches have been released yet. The vulnerability was published on July 19, 2025, and assigned by Wordfence.
Potential Impact
For European organizations using WordPress sites with the EPay.bg Payments plugin, this vulnerability poses a moderate risk. Since the plugin handles payment processing, exploitation could undermine trust in e-commerce platforms by enabling attackers to steal session tokens, perform unauthorized actions on behalf of users, or inject malicious content that could lead to phishing or malware distribution. The requirement for contributor-level access limits the attack surface to insiders or compromised accounts, but many organizations allow multiple users with such privileges, increasing risk. The scope change in the CVSS vector indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the website or user sessions. Confidentiality and integrity of user data could be compromised, which is critical for compliance with GDPR and other European data protection regulations. Although availability is not impacted, reputational damage and potential regulatory penalties could be significant. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in payment-related infrastructure makes it a high-priority issue for European businesses relying on this plugin.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, restrict contributor-level access strictly to trusted users and review existing user privileges to minimize the number of accounts that can exploit this flaw. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute inputs that may contain script tags or JavaScript event handlers. Conduct thorough input validation and output encoding on all user-supplied data within the WordPress environment, especially for shortcode attributes, as a temporary protective measure until an official patch is released. Monitor logs for unusual activity related to shortcode usage or unexpected script injections. Consider disabling or removing the EPay.bg Payments plugin if it is not essential or if no timely patch is available. Additionally, educate content contributors about the risks of injecting untrusted content and enforce strict content policies. Once a patch is released, prioritize immediate update and testing in staging environments before deployment. Finally, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites.
Affected Countries
Bulgaria, Germany, United Kingdom, France, Netherlands, Poland
CVE-2025-7653: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vloo EPay.bg Payments
Description
The EPay.bg Payments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'epay' shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-7653 is a stored Cross-Site Scripting (XSS) vulnerability affecting the EPay.bg Payments plugin for WordPress, developed by vloo. This vulnerability exists in all versions up to and including 0.1 of the plugin. The root cause is insufficient sanitization and output escaping of user-supplied attributes in the plugin's 'epay' shortcode, which is used to embed payment functionalities within WordPress pages. Because the vulnerability is stored XSS, malicious scripts injected by an attacker are saved on the server and executed whenever any user accesses the compromised page. Exploitation requires the attacker to have at least contributor-level authenticated access to the WordPress site, enabling them to inject arbitrary JavaScript code via shortcode attributes. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, privileges required, no user interaction, and a scope change with limited confidentiality and integrity impact but no availability impact. This vulnerability can lead to session hijacking, defacement, or redirection attacks, compromising user data and site integrity. No public exploits are known at this time, and no patches have been released yet. The vulnerability was published on July 19, 2025, and assigned by Wordfence.
Potential Impact
For European organizations using WordPress sites with the EPay.bg Payments plugin, this vulnerability poses a moderate risk. Since the plugin handles payment processing, exploitation could undermine trust in e-commerce platforms by enabling attackers to steal session tokens, perform unauthorized actions on behalf of users, or inject malicious content that could lead to phishing or malware distribution. The requirement for contributor-level access limits the attack surface to insiders or compromised accounts, but many organizations allow multiple users with such privileges, increasing risk. The scope change in the CVSS vector indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the website or user sessions. Confidentiality and integrity of user data could be compromised, which is critical for compliance with GDPR and other European data protection regulations. Although availability is not impacted, reputational damage and potential regulatory penalties could be significant. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in payment-related infrastructure makes it a high-priority issue for European businesses relying on this plugin.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, restrict contributor-level access strictly to trusted users and review existing user privileges to minimize the number of accounts that can exploit this flaw. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode attribute inputs that may contain script tags or JavaScript event handlers. Conduct thorough input validation and output encoding on all user-supplied data within the WordPress environment, especially for shortcode attributes, as a temporary protective measure until an official patch is released. Monitor logs for unusual activity related to shortcode usage or unexpected script injections. Consider disabling or removing the EPay.bg Payments plugin if it is not essential or if no timely patch is available. Additionally, educate content contributors about the risks of injecting untrusted content and enforce strict content policies. Once a patch is released, prioritize immediate update and testing in staging environments before deployment. Finally, implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-14T17:44:15.480Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687b036ea83201eaacf8db3a
Added to database: 7/19/2025, 2:31:10 AM
Last enriched: 7/19/2025, 2:46:58 AM
Last updated: 7/19/2025, 5:09:44 AM
Views: 4
Related Threats
CVE-2025-7815: Cross Site Scripting in PHPGurukul Apartment Visitors Management System
MediumCVE-2025-6997: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ThemeREX ThemeREX Addons
MediumCVE-2025-6721: CWE-862 Missing Authorization in bandido MORKVA Vchasno Kasa Integration
MediumCVE-2025-6720: CWE-862 Missing Authorization in bandido MORKVA Vchasno Kasa Integration
MediumCVE-2025-29757: CWE-863 Incorrect Authorization in Growatt https://oss.growatt.com
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.