Skip to main content

CVE-2025-8392: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bessermitfahren Mitfahrgelegenheit

Medium
VulnerabilityCVE-2025-8392cvecve-2025-8392cwe-79
Published: Thu Sep 11 2025 (09/11/2025, 07:24:57 UTC)
Source: CVE Database V5
Vendor/Project: bessermitfahren
Product: Mitfahrgelegenheit

Description

The Mitfahrgelegenheit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘date’ parameter in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 09/11/2025, 07:38:23 UTC

Technical Analysis

CVE-2025-8392 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Mitfahrgelegenheit plugin for WordPress, developed by bessermitfahren. This vulnerability exists in all versions up to and including 1.1.5, due to improper neutralization of input during web page generation, specifically via the 'date' parameter. The root cause is insufficient input sanitization and output escaping, which allows an authenticated attacker with Contributor-level privileges or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS v3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of an authenticated contributor. No user interaction is needed for exploitation once the malicious script is injected, and the scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no official patches have been linked yet. The CWE classification is CWE-79, which corresponds to improper neutralization of input during web page generation, a common cause of XSS vulnerabilities. This vulnerability is significant because WordPress is widely used across Europe, and plugins like Mitfahrgelegenheit are often employed for ride-sharing or carpooling services, which may contain sensitive user data and community interactions. Stored XSS is particularly dangerous as it persists on the server and affects all users accessing the infected content, increasing the attack surface and potential damage.

Potential Impact

For European organizations, especially those operating ride-sharing or community-based platforms using WordPress with the Mitfahrgelegenheit plugin, this vulnerability poses a tangible risk. Exploitation could lead to theft of user credentials, session tokens, or personal data, undermining user trust and violating data protection regulations such as GDPR. The ability for an attacker with Contributor-level access to inject scripts means insider threats or compromised contributor accounts can be leveraged to escalate attacks. This could result in defacement, phishing campaigns targeting users, or lateral movement within the organization's network. The medium severity score reflects moderate impact on confidentiality and integrity, with no direct availability impact. However, reputational damage and regulatory penalties could be significant if user data is compromised. The vulnerability's exploitation does not require user interaction, increasing the risk of automated or widespread attacks once exploited. European organizations relying on WordPress plugins for community engagement or transportation services should be particularly vigilant, as these sectors are critical and often targeted for data theft or disruption.

Mitigation Recommendations

1. Immediate mitigation should include restricting Contributor-level user permissions to only trusted individuals and monitoring for unusual activity or script injections in pages. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'date' parameter or script injection attempts. 3. Apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected web pages. 4. Regularly audit and sanitize all user inputs, especially those that are stored and rendered on pages, using secure coding practices and libraries that enforce output encoding. 5. Monitor official bessermitfahren and WordPress plugin repositories for patches or updates addressing this vulnerability and apply them promptly once available. 6. Conduct security awareness training for contributors to recognize phishing or social engineering attempts that could lead to account compromise. 7. Employ security scanning tools to detect stored XSS vulnerabilities in staging environments before deployment. 8. Consider temporarily disabling or replacing the Mitfahrgelegenheit plugin if immediate patching is not possible, to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-30T19:52:15.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a21e1c560fa9d94d430

Added to database: 9/11/2025, 7:28:33 AM

Last enriched: 9/11/2025, 7:38:23 AM

Last updated: 9/11/2025, 7:07:37 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats