Skip to main content

CVE-2025-7810: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in streamweasels StreamWeasels Kick Integration

Medium
VulnerabilityCVE-2025-7810cvecve-2025-7810cwe-79
Published: Tue Jul 29 2025 (07/29/2025, 03:41:21 UTC)
Source: CVE Database V5
Vendor/Project: streamweasels
Product: StreamWeasels Kick Integration

Description

The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'data-uuid' attribute in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/29/2025, 04:32:49 UTC

Technical Analysis

CVE-2025-7810 is a stored Cross-Site Scripting (XSS) vulnerability affecting the StreamWeasels Kick Integration plugin for WordPress, specifically in all versions up to and including 1.1.4. The vulnerability arises from improper neutralization of input during web page generation, categorized under CWE-79. The issue is located in the plugin's handling of the 'data-uuid' attribute, where insufficient input sanitization and output escaping allow an authenticated attacker with contributor-level access or higher to inject arbitrary JavaScript code. This malicious script is stored persistently and executed whenever any user accesses the compromised page. The vulnerability requires authentication with contributor privileges, involves user interaction (visiting the infected page), and affects the confidentiality and integrity of user data by enabling script execution in the context of the victim's browser. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, privileges required, user interaction needed, and a scope change with partial impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because WordPress is a widely used content management system, and plugins like StreamWeasels Kick Integration are often installed to enhance functionality, making this a vector for attackers to compromise websites and potentially escalate attacks through session hijacking, credential theft, or defacement.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the affected StreamWeasels Kick Integration plugin. Exploitation could lead to unauthorized script execution in users' browsers, resulting in theft of session cookies, user impersonation, or distribution of malware. This can damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and cause operational disruptions if attackers manipulate website content or user interactions. Since the attack requires contributor-level access, insider threats or compromised accounts are the main vectors. Organizations relying on WordPress for public-facing or internal portals should be aware that this vulnerability could be exploited to target employees or customers, potentially leading to broader network compromise or data leakage. The medium severity score suggests that while the threat is not critical, it is sufficiently serious to warrant prompt attention, especially in sectors with high regulatory compliance requirements such as finance, healthcare, and government within Europe.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately audit WordPress installations to identify the presence of the StreamWeasels Kick Integration plugin and verify the version in use. 2) Restrict contributor-level access strictly to trusted users and review user permissions to minimize the risk of insider exploitation. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'data-uuid' attribute. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Monitor website logs for unusual activity indicative of XSS exploitation attempts. 6) Since no official patch is currently available, consider temporarily disabling or removing the vulnerable plugin until a fix is released. 7) Educate content contributors about safe input practices and the risks of injecting untrusted content. 8) Regularly update WordPress core and plugins to incorporate security fixes promptly once patches are published. These targeted measures go beyond generic advice by focusing on access control, detection, and containment specific to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T15:18:46.189Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68884b63ad5a09ad008aed4f

Added to database: 7/29/2025, 4:17:39 AM

Last enriched: 7/29/2025, 4:32:49 AM

Last updated: 8/4/2025, 12:34:21 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats