Skip to main content

CVE-2025-8113: CWE-79 Cross-Site Scripting (XSS) in Ebook Store

Medium
VulnerabilityCVE-2025-8113cvecve-2025-8113cwe-79
Published: Sat Aug 16 2025 (08/16/2025, 06:00:05 UTC)
Source: CVE Database V5
Product: Ebook Store

Description

The Ebook Store WordPress plugin before 5.8015 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers.

AI-Powered Analysis

AILast updated: 08/16/2025, 06:32:50 UTC

Technical Analysis

CVE-2025-8113 is a Reflected Cross-Site Scripting (XSS) vulnerability identified in the Ebook Store WordPress plugin versions prior to 5.8015. The vulnerability arises because the plugin fails to properly escape the $_SERVER['REQUEST_URI'] parameter before outputting it within an HTML attribute context. This improper handling allows an attacker to inject malicious scripts into the URL, which are then reflected back to the user’s browser without adequate sanitization. When a victim visits a crafted URL containing the malicious payload, the script executes in the context of the user’s browser session. This vulnerability specifically affects older web browsers, which may lack modern XSS protections such as Content Security Policy (CSP) enforcement or improved input sanitization mechanisms. Since the vulnerability is reflected, it requires the victim to click on or visit a maliciously crafted link. The plugin’s failure to sanitize user input in the REQUEST_URI parameter is a classic example of CWE-79, which is a common web application security weakness. Although no known exploits are currently reported in the wild, the vulnerability’s presence in a WordPress plugin—widely used across many websites—makes it a potential vector for phishing, session hijacking, or other client-side attacks. The absence of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, but the technical details suggest it is a typical reflected XSS with limited impact on server-side integrity or availability but significant risk to client-side confidentiality and integrity.

Potential Impact

For European organizations, the impact of CVE-2025-8113 can be significant, especially for those operating public-facing websites using the Ebook Store WordPress plugin. Successful exploitation could lead to session hijacking, theft of authentication tokens, or unauthorized actions performed on behalf of users, potentially compromising customer data and trust. This is particularly critical for e-commerce and digital content providers where user accounts and payment information are involved. Additionally, exploitation could facilitate phishing attacks by injecting misleading content or redirecting users to malicious sites. While the vulnerability primarily affects older browsers, many users in Europe still operate legacy systems or browsers due to corporate policies or hardware limitations, increasing the risk. Furthermore, regulatory frameworks such as GDPR impose strict requirements on protecting user data, and a successful XSS attack leading to data leakage could result in legal and financial penalties. The vulnerability does not directly compromise server integrity or availability, but the reputational damage and potential loss of customer confidence could have long-term business impacts.

Mitigation Recommendations

European organizations should prioritize updating the Ebook Store plugin to version 5.8015 or later, where this vulnerability is presumably fixed. If immediate patching is not feasible, implementing Web Application Firewall (WAF) rules to detect and block suspicious input patterns in the REQUEST_URI parameter can reduce risk. Organizations should also enforce the use of modern browsers with up-to-date security features among their user base and internal staff. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Additionally, security teams should conduct regular vulnerability scans and penetration tests focusing on reflected XSS vectors. Educating users about the risks of clicking on suspicious links and implementing multi-factor authentication (MFA) can further reduce the impact of session hijacking attempts. Monitoring web server logs for unusual request patterns targeting the REQUEST_URI parameter can provide early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-07-24T12:09:34.055Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a0228bad5a09ad00754c5e

Added to database: 8/16/2025, 6:17:47 AM

Last enriched: 8/16/2025, 6:32:50 AM

Last updated: 8/16/2025, 11:01:47 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats