CVE-2025-8391: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in awssoft Magic Edge – Lite
The Magic Edge – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘height’ parameter in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-8391 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Magic Edge – Lite WordPress plugin developed by awssoft. This vulnerability affects all versions up to and including 1.1.6. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'height' parameter. An authenticated attacker with Contributor-level or higher privileges can exploit this flaw by injecting malicious JavaScript code into pages via the vulnerable parameter. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based with low attack complexity, requiring privileges but no user interaction. The scope is changed, meaning the vulnerability can affect resources beyond the initially compromised component. No known exploits are currently reported in the wild, and no official patches have been released yet. The vulnerability was publicly disclosed on August 2, 2025, with the Wordfence team as the assigner. This vulnerability falls under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations using WordPress sites with the Magic Edge – Lite plugin, this vulnerability poses a significant risk to web application security and user trust. Stored XSS can lead to the theft of authentication cookies, enabling attackers to impersonate legitimate users, including administrators, potentially resulting in unauthorized access and control over the website. This can further lead to data breaches, defacement, or distribution of malware to site visitors. Given the medium CVSS score and the requirement for Contributor-level access, insider threats or compromised accounts are the most likely attack vectors. The impact on confidentiality and integrity is moderate, while availability is not directly affected. European organizations that rely on WordPress for e-commerce, customer portals, or internal communication could face reputational damage, regulatory scrutiny under GDPR for data protection failures, and financial losses due to exploitation of this vulnerability.
Mitigation Recommendations
1. Immediate mitigation should include restricting Contributor-level access to trusted users only and reviewing existing user privileges to minimize the risk of exploitation. 2. Implement Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the 'height' parameter in Magic Edge – Lite plugin requests. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 4. Monitor logs for unusual activity related to the plugin or unexpected script injections. 5. Since no official patch is currently available, consider temporarily disabling the Magic Edge – Lite plugin or replacing it with alternative plugins that provide similar functionality without this vulnerability. 6. Educate site administrators and content contributors about the risks of XSS and safe content practices. 7. Once a patch is released, prioritize immediate testing and deployment to eliminate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-8391: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in awssoft Magic Edge – Lite
Description
The Magic Edge – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘height’ parameter in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-8391 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Magic Edge – Lite WordPress plugin developed by awssoft. This vulnerability affects all versions up to and including 1.1.6. The root cause is improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'height' parameter. An authenticated attacker with Contributor-level or higher privileges can exploit this flaw by injecting malicious JavaScript code into pages via the vulnerable parameter. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based with low attack complexity, requiring privileges but no user interaction. The scope is changed, meaning the vulnerability can affect resources beyond the initially compromised component. No known exploits are currently reported in the wild, and no official patches have been released yet. The vulnerability was publicly disclosed on August 2, 2025, with the Wordfence team as the assigner. This vulnerability falls under CWE-79, which covers improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations using WordPress sites with the Magic Edge – Lite plugin, this vulnerability poses a significant risk to web application security and user trust. Stored XSS can lead to the theft of authentication cookies, enabling attackers to impersonate legitimate users, including administrators, potentially resulting in unauthorized access and control over the website. This can further lead to data breaches, defacement, or distribution of malware to site visitors. Given the medium CVSS score and the requirement for Contributor-level access, insider threats or compromised accounts are the most likely attack vectors. The impact on confidentiality and integrity is moderate, while availability is not directly affected. European organizations that rely on WordPress for e-commerce, customer portals, or internal communication could face reputational damage, regulatory scrutiny under GDPR for data protection failures, and financial losses due to exploitation of this vulnerability.
Mitigation Recommendations
1. Immediate mitigation should include restricting Contributor-level access to trusted users only and reviewing existing user privileges to minimize the risk of exploitation. 2. Implement Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the 'height' parameter in Magic Edge – Lite plugin requests. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 4. Monitor logs for unusual activity related to the plugin or unexpected script injections. 5. Since no official patch is currently available, consider temporarily disabling the Magic Edge – Lite plugin or replacing it with alternative plugins that provide similar functionality without this vulnerability. 6. Educate site administrators and content contributors about the risks of XSS and safe content practices. 7. Once a patch is released, prioritize immediate testing and deployment to eliminate the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-30T19:49:20.203Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688eae8dad5a09ad00d6f0e8
Added to database: 8/3/2025, 12:34:21 AM
Last enriched: 8/3/2025, 12:35:00 AM
Last updated: 8/3/2025, 1:35:10 PM
Views: 5
Related Threats
CVE-2025-8513: Improper Export of Android Application Components in Caixin News App
MediumCVE-2025-8512: Improper Export of Android Application Components in TVB Big Big Shop App
MediumCVE-2025-8511: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-8510: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-8509: Cross Site Scripting in Portabilis i-Educar
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.