Skip to main content

CVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider

Medium
VulnerabilityCVE-2025-8690cvecve-2025-8690cwe-79
Published: Tue Aug 12 2025 (08/12/2025, 02:24:47 UTC)
Source: CVE Database V5
Vendor/Project: addix
Product: Simple Responsive Slider

Description

The Simple Responsive Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 08/12/2025, 02:48:40 UTC

Technical Analysis

CVE-2025-8690 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the Simple Responsive Slider plugin for WordPress, developed by addix. This vulnerability exists in all versions up to and including version 2.0 due to improper input sanitization and insufficient output escaping when generating web pages. Specifically, authenticated users with Contributor-level access or higher can inject arbitrary malicious scripts into pages via the plugin's interface. These scripts are stored persistently and execute whenever any user accesses the compromised page. The vulnerability is classified under CWE-79, which relates to improper neutralization of input during web page generation. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (Contributor or higher), no user interaction needed, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable plugin. The impact includes limited confidentiality and integrity loss but no direct availability impact. No known exploits are currently reported in the wild, and no official patches have been released yet. The vulnerability allows attackers to execute arbitrary JavaScript in the context of the affected site, potentially leading to session hijacking, privilege escalation, defacement, or distribution of malware to site visitors. Since WordPress is widely used across Europe, and the plugin is installed on numerous sites, this vulnerability poses a significant risk to website integrity and user trust.

Potential Impact

For European organizations, especially those relying on WordPress for their public-facing websites or intranet portals, this vulnerability can lead to several adverse outcomes. Attackers with Contributor-level access (which is a common role for content creators and editors) can inject malicious scripts that execute in the browsers of site visitors or administrators. This can result in theft of authentication cookies, enabling session hijacking and unauthorized access to privileged accounts. It can also facilitate defacement attacks, damaging brand reputation and customer trust. Additionally, attackers could use the vulnerability to distribute malware or phishing content to users, potentially leading to broader compromise. Given the interconnected nature of European digital infrastructure and strict data protection regulations such as GDPR, exploitation could also result in data breaches with legal and financial consequences. The scope change in the CVSS vector indicates that the vulnerability may affect other components or plugins interacting with the slider, increasing the risk of widespread impact. Organizations in sectors such as e-commerce, media, education, and government, which often use WordPress extensively, are particularly at risk.

Mitigation Recommendations

1. Immediate mitigation involves restricting Contributor-level access to trusted users only until a patch is available. Review and tighten user role assignments to minimize the number of users who can inject content. 2. Implement a Web Application Firewall (WAF) with rules designed to detect and block typical XSS payloads targeting the Simple Responsive Slider plugin. 3. Monitor website content for unexpected script injections or unauthorized changes, using automated integrity monitoring tools. 4. Educate content contributors about the risks of injecting untrusted content and enforce strict content validation policies. 5. Regularly update WordPress core and all plugins; once the vendor releases a patch for this vulnerability, apply it promptly. 6. Consider disabling or replacing the Simple Responsive Slider plugin with a more secure alternative if immediate patching is not feasible. 7. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 8. Conduct periodic security audits and penetration tests focusing on user input handling and plugin vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-06T21:50:58.724Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689aa7d3ad5a09ad002be7cb

Added to database: 8/12/2025, 2:32:51 AM

Last enriched: 8/12/2025, 2:48:40 AM

Last updated: 8/12/2025, 11:37:17 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats