Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8624: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdive Nexa Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE

0
Medium
VulnerabilityCVE-2025-8624cvecve-2025-8624cwe-79
Published: Tue Sep 30 2025 (09/30/2025, 03:35:29 UTC)
Source: CVE Database V5
Vendor/Project: wpdive
Product: Nexa Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE

Description

CVE-2025-8624 is a stored Cross-Site Scripting (XSS) vulnerability in the Nexa Blocks WordPress plugin, specifically affecting the Google Maps widget. Authenticated users with contributor-level access or higher can inject malicious scripts due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability affects all versions up to 1. 1. 0 and has a CVSS score of 6. 4 (medium severity). No known exploits are currently reported in the wild. European organizations using this plugin in their WordPress sites should prioritize patching or mitigating this issue to prevent abuse. The threat is particularly relevant to countries with high WordPress adoption and active web content management, such as Germany, the UK, and France.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:36:33 UTC

Technical Analysis

CVE-2025-8624 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the Nexa Blocks plugin for WordPress, which provides Gutenberg blocks and page builder functionality. The vulnerability arises from improper neutralization of user input in the Google Maps widget, where user-supplied attributes are not adequately sanitized or escaped before being rendered in web pages. This flaw allows authenticated attackers with contributor-level permissions or higher to inject arbitrary JavaScript code that is persistently stored and executed in the context of any user accessing the affected page. The attack vector requires no user interaction beyond visiting the compromised page, and the vulnerability scope is broad since it affects all versions up to and including 1.1.0. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required (low), no user interaction, and impacts on confidentiality and integrity but not availability. While no public exploits are currently known, the vulnerability poses a significant risk because contributor-level access is commonly granted in collaborative WordPress environments, and exploitation could lead to session hijacking, defacement, or further exploitation such as privilege escalation or malware distribution. The vulnerability was published on September 30, 2025, and no official patches or updates have been linked yet, indicating the need for immediate attention from administrators using this plugin.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized script execution within their WordPress sites, compromising user sessions, stealing sensitive data, or defacing websites. Given WordPress's widespread use in Europe for corporate, governmental, and small business websites, exploitation could damage organizational reputation, lead to data breaches, and disrupt services. The requirement for contributor-level access means insider threats or compromised accounts could be leveraged to exploit this vulnerability. Additionally, the persistent nature of stored XSS increases the risk of widespread impact across multiple users and sessions. Organizations in sectors with strict data protection regulations such as GDPR may face compliance issues and legal consequences if user data is compromised. The lack of known exploits currently provides a window for proactive mitigation, but the medium severity score indicates that the threat should not be underestimated.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Nexa Blocks plugin and verify the version in use. Since no official patches are currently linked, temporary mitigations include disabling or removing the Google Maps widget within the plugin or the entire plugin if feasible. Restrict contributor-level access strictly to trusted users and implement multi-factor authentication to reduce the risk of account compromise. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection attempts targeting the affected widget. Regularly monitor website content for unauthorized script injections and conduct security scans focusing on XSS vulnerabilities. Educate content contributors about the risks of injecting untrusted content and enforce strict content validation policies. Stay updated with vendor announcements for patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-05T21:21:26.123Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db52afa473ffe031e447df

Added to database: 9/30/2025, 3:46:55 AM

Last enriched: 10/7/2025, 11:36:33 AM

Last updated: 11/14/2025, 6:41:30 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats