CVE-2025-7658: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codents Temporarily Hidden Content
The Temporarily Hidden Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'temphc-start' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-7658 is a stored Cross-Site Scripting (XSS) vulnerability affecting the 'Temporarily Hidden Content' WordPress plugin developed by codents, specifically versions up to and including 1.0.6. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. The plugin's 'temphc-start' shortcode fails to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. This malicious script is stored persistently and executes whenever any user accesses the compromised page. The vulnerability does not require user interaction to trigger once the malicious content is loaded, and it can impact the confidentiality and integrity of user data by enabling session hijacking, credential theft, or unauthorized actions on behalf of users. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, privileges required (low), no user interaction, and a scope change due to the potential impact on other users. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk in environments where multiple users have contributor or higher privileges and where the plugin is installed. The vulnerability's exploitation could lead to persistent XSS attacks that compromise site visitors and administrators alike, potentially facilitating further attacks such as privilege escalation or malware distribution within WordPress sites.
Potential Impact
For European organizations, the impact of this vulnerability can be considerable, especially for those relying on WordPress as a content management system with the Temporarily Hidden Content plugin installed. Exploitation could lead to unauthorized script execution affecting site visitors and administrators, resulting in data leakage, session hijacking, or defacement. This could damage organizational reputation, lead to regulatory non-compliance under GDPR due to personal data exposure, and cause operational disruptions. Organizations with multi-user WordPress environments are particularly at risk since contributors can inject malicious scripts. The vulnerability could also be leveraged to pivot into broader network attacks if administrative credentials are compromised. Given the widespread use of WordPress across European businesses, media, and government websites, the risk extends beyond individual sites to potentially critical infrastructure and public-facing services.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should monitor for and apply any official patches or updates from codents addressing this vulnerability. Since no patch links are currently available, administrators should consider disabling the plugin until a fix is released. 2. Restrict contributor privileges: Limit contributor-level access strictly to trusted users and review user roles regularly to minimize the risk of malicious script injection. 3. Implement Web Application Firewall (WAF) rules: Deploy WAF rules that detect and block suspicious shortcode attribute inputs or script injection attempts targeting the 'temphc-start' shortcode. 4. Harden input validation: Site administrators or developers should implement additional input sanitization and output escaping at the application level if possible, especially for user-supplied shortcode attributes. 5. Conduct regular security audits: Perform frequent scans and manual reviews of WordPress content for injected scripts or anomalies, focusing on pages using the vulnerable shortcode. 6. Educate users: Train content contributors on secure content practices and the risks of injecting untrusted code. 7. Monitor logs and user activity: Detect unusual behavior from contributor accounts that might indicate exploitation attempts. These targeted measures go beyond generic advice by focusing on the specific plugin, user roles, and content injection vectors involved.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7658: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codents Temporarily Hidden Content
Description
The Temporarily Hidden Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'temphc-start' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-7658 is a stored Cross-Site Scripting (XSS) vulnerability affecting the 'Temporarily Hidden Content' WordPress plugin developed by codents, specifically versions up to and including 1.0.6. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. The plugin's 'temphc-start' shortcode fails to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. This malicious script is stored persistently and executes whenever any user accesses the compromised page. The vulnerability does not require user interaction to trigger once the malicious content is loaded, and it can impact the confidentiality and integrity of user data by enabling session hijacking, credential theft, or unauthorized actions on behalf of users. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, privileges required (low), no user interaction, and a scope change due to the potential impact on other users. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk in environments where multiple users have contributor or higher privileges and where the plugin is installed. The vulnerability's exploitation could lead to persistent XSS attacks that compromise site visitors and administrators alike, potentially facilitating further attacks such as privilege escalation or malware distribution within WordPress sites.
Potential Impact
For European organizations, the impact of this vulnerability can be considerable, especially for those relying on WordPress as a content management system with the Temporarily Hidden Content plugin installed. Exploitation could lead to unauthorized script execution affecting site visitors and administrators, resulting in data leakage, session hijacking, or defacement. This could damage organizational reputation, lead to regulatory non-compliance under GDPR due to personal data exposure, and cause operational disruptions. Organizations with multi-user WordPress environments are particularly at risk since contributors can inject malicious scripts. The vulnerability could also be leveraged to pivot into broader network attacks if administrative credentials are compromised. Given the widespread use of WordPress across European businesses, media, and government websites, the risk extends beyond individual sites to potentially critical infrastructure and public-facing services.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should monitor for and apply any official patches or updates from codents addressing this vulnerability. Since no patch links are currently available, administrators should consider disabling the plugin until a fix is released. 2. Restrict contributor privileges: Limit contributor-level access strictly to trusted users and review user roles regularly to minimize the risk of malicious script injection. 3. Implement Web Application Firewall (WAF) rules: Deploy WAF rules that detect and block suspicious shortcode attribute inputs or script injection attempts targeting the 'temphc-start' shortcode. 4. Harden input validation: Site administrators or developers should implement additional input sanitization and output escaping at the application level if possible, especially for user-supplied shortcode attributes. 5. Conduct regular security audits: Perform frequent scans and manual reviews of WordPress content for injected scripts or anomalies, focusing on pages using the vulnerable shortcode. 6. Educate users: Train content contributors on secure content practices and the risks of injecting untrusted code. 7. Monitor logs and user activity: Detect unusual behavior from contributor accounts that might indicate exploitation attempts. These targeted measures go beyond generic advice by focusing on the specific plugin, user roles, and content injection vectors involved.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-14T20:29:53.582Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687b036ea83201eaacf8db43
Added to database: 7/19/2025, 2:31:10 AM
Last enriched: 7/19/2025, 2:46:37 AM
Last updated: 7/19/2025, 2:46:37 AM
Views: 2
Related Threats
CVE-2025-7697: CWE-502 Deserialization of Untrusted Data in crmperks Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms
CriticalCVE-2025-7696: CWE-502 Deserialization of Untrusted Data in crmperks Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms
CriticalCVE-2025-7669: CWE-352 Cross-Site Request Forgery (CSRF) in avishika Avishi WP PayPal Payment Button
MediumCVE-2025-7661: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in maxomatos Partnerský systém Martinus
MediumCVE-2025-7655: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tkrivickas Live Stream Badger
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.