Skip to main content

CVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin

Medium
VulnerabilityCVE-2025-8604cvecve-2025-8604cwe-79
Published: Fri Aug 15 2025 (08/15/2025, 07:24:40 UTC)
Source: CVE Database V5
Vendor/Project: wptb
Product: WP Table Builder – WordPress Table Plugin

Description

The WP Table Builder – WordPress Table Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wptb shortcode in all versions up to, and including, 2.0.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 08/15/2025, 07:47:51 UTC

Technical Analysis

CVE-2025-8604 is a stored Cross-Site Scripting (XSS) vulnerability affecting the WP Table Builder plugin for WordPress, versions up to and including 2.0.12. This vulnerability arises from improper input sanitization and insufficient output escaping of user-supplied attributes in the plugin's wptb shortcode functionality. Specifically, authenticated users with contributor-level access or higher can inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently within the website content, it executes every time a user accesses the compromised page, potentially affecting any visitor or administrator who views the page. The vulnerability is classified under CWE-79, which relates to improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based (remote), requires low attack complexity, and privileges at the contributor level, but does not require user interaction. The impact affects confidentiality and integrity but not availability. No known public exploits have been reported yet. The vulnerability is significant because WordPress is a widely used CMS, and WP Table Builder is a popular plugin for creating tables, meaning many websites could be affected if they have not updated the plugin. The stored XSS can be leveraged to hijack user sessions, deface websites, or conduct further attacks such as phishing or malware distribution within the context of the vulnerable site.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the WP Table Builder plugin installed. The ability for contributors to inject persistent malicious scripts can lead to session hijacking of administrators or other users, theft of sensitive information, and unauthorized actions performed on behalf of users. This can damage organizational reputation, lead to data breaches, and potentially violate GDPR requirements concerning data protection and breach notification. E-commerce sites, government portals, and other public-facing platforms using this plugin are particularly at risk. The vulnerability does not directly affect availability but can undermine trust and integrity of web services. Additionally, since contributor-level access is required, insider threats or compromised contributor accounts increase the risk. The lack of known exploits in the wild currently reduces immediate risk, but the widespread use of WordPress in Europe means rapid exploitation could occur once proof-of-concept code becomes available.

Mitigation Recommendations

1. Immediate update of the WP Table Builder plugin to a patched version once released by the vendor. Since no patch links are currently available, organizations should monitor vendor advisories closely. 2. Restrict contributor-level access strictly to trusted users and review user permissions regularly to minimize the risk of malicious input. 3. Implement Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting the wptb shortcode parameters. 4. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected websites. 5. Conduct regular security audits and code reviews of custom shortcodes or plugins to identify similar input validation issues. 6. Educate content contributors about the risks of injecting untrusted content and enforce input validation on all user-generated content. 7. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. 8. Consider isolating or sandboxing user-generated content areas to limit impact of potential XSS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-05T17:49:52.145Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ee2a1ad5a09ad0063d6f2

Added to database: 8/15/2025, 7:32:49 AM

Last enriched: 8/15/2025, 7:47:51 AM

Last updated: 8/22/2025, 4:25:18 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats