Skip to main content

CVE-2025-8624: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdive Nexa Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE

Medium
VulnerabilityCVE-2025-8624cvecve-2025-8624cwe-79
Published: Tue Sep 30 2025 (09/30/2025, 03:35:29 UTC)
Source: CVE Database V5
Vendor/Project: wpdive
Product: Nexa Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE

Description

The Nexa Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Google Maps widget in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 09/30/2025, 04:02:14 UTC

Technical Analysis

CVE-2025-8624 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Nexa Blocks plugin for WordPress, specifically versions up to and including 1.1.0. This plugin is used as a page builder for the Gutenberg editor and Full Site Editing (FSE) in WordPress. The vulnerability arises from insufficient input sanitization and output escaping in the plugin's Google Maps widget, which allows authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. Because the malicious script is stored persistently in the page content, it executes whenever any user accesses the compromised page. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (contributor or higher), no user interaction, and scope change. The impact includes partial loss of confidentiality and integrity, as attackers can execute scripts in the context of other users, potentially stealing session tokens, defacing content, or performing actions on behalf of users. There are no known public exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability affects all versions of the Nexa Blocks plugin up to 1.1.0, which is widely used in WordPress sites employing Gutenberg blocks for page building.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those using WordPress sites with the Nexa Blocks plugin. The ability for authenticated contributors to inject persistent scripts can lead to data theft, session hijacking, and unauthorized actions within the site, potentially compromising user data and organizational reputation. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, exploitation could disrupt business operations and lead to regulatory non-compliance under GDPR if personal data is exposed. The scope of impact is heightened in organizations that allow multiple contributors or editors with contributor-level access, as these users could be targeted or compromised to exploit the vulnerability. Additionally, the stored nature of the XSS means that all visitors to the infected pages are at risk, amplifying the potential damage. While no active exploits are known, the medium severity and ease of exploitation (low complexity, no user interaction) suggest that attackers could develop exploits quickly once the vulnerability is publicly known.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their WordPress installations for the presence of the Nexa Blocks plugin and verify the version in use. Until an official patch is released, organizations should restrict contributor-level access to trusted users only and consider temporarily disabling or removing the Google Maps widget functionality within the plugin. Implementing Web Application Firewall (WAF) rules that detect and block suspicious script injection attempts targeting the plugin's widget parameters can provide interim protection. Additionally, organizations should enforce strict content security policies (CSP) to limit the execution of unauthorized scripts. Regular monitoring of website content for unexpected script injections and user activity logs for unusual contributor behavior is recommended. Once a patch is available, prompt application of updates is critical. Finally, educating contributors about safe content practices and the risks of injecting untrusted code can reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-05T21:21:26.123Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db52afa473ffe031e447df

Added to database: 9/30/2025, 3:46:55 AM

Last enriched: 9/30/2025, 4:02:14 AM

Last updated: 10/2/2025, 12:10:59 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats