Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8721: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in miriamgoldman Workable Api

0
Medium
VulnerabilityCVE-2025-8721cvecve-2025-8721cwe-79
Published: Thu Sep 11 2025 (09/11/2025, 07:24:49 UTC)
Source: CVE Database V5
Vendor/Project: miriamgoldman
Product: Workable Api

Description

The Workable Api plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's workable_jobs shortcode in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:27:03 UTC

Technical Analysis

CVE-2025-8721 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Workable Api plugin for WordPress, maintained by miriamgoldman. The flaw exists in all versions up to and including 1.0.4, specifically in the handling of the workable_jobs shortcode. The vulnerability stems from insufficient input sanitization and output escaping of user-supplied attributes, allowing an attacker with contributor-level or higher privileges to inject arbitrary JavaScript code into pages generated by the plugin. Because the injected scripts are stored persistently, they execute every time a user accesses the compromised page, potentially affecting any visitor or administrator. The CVSS 3.1 score of 6.4 reflects a medium severity, with an attack vector of network (remote), low attack complexity, requiring privileges (contributor or higher), no user interaction, and a scope change due to the ability to affect other users. The impact includes limited confidentiality and integrity loss, such as session hijacking, defacement, or unauthorized actions performed in the context of the victim's browser. No patches or official fixes have been published yet, and no known exploits are reported in the wild. The vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those that accept user-generated content or attributes. Since exploitation requires authenticated access, the risk is somewhat mitigated by the need for contributor-level permissions, but insider threats or compromised accounts could leverage this flaw to escalate impact.

Potential Impact

The primary impact of CVE-2025-8721 is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress pages using the Workable Api plugin. This can lead to session hijacking, theft of sensitive information, defacement of websites, or unauthorized actions performed on behalf of other users, including administrators. Because the scripts execute in the context of any user viewing the infected page, the vulnerability can facilitate broader compromise within an organization’s web environment. Organizations relying on this plugin for recruitment or HR functions may face reputational damage, data leakage, and operational disruption. The requirement for authenticated access limits exploitation to insiders or attackers who have already compromised user credentials, but this does not eliminate risk, especially in large organizations with many contributors. The scope of affected systems includes all WordPress sites using the vulnerable versions of the Workable Api plugin, which may be widespread given WordPress’s global popularity. The vulnerability does not affect availability directly but can indirectly cause service disruption through defacement or administrative interference.

Mitigation Recommendations

1. Immediate mitigation involves restricting contributor-level and higher access to trusted users only, minimizing the risk of malicious input. 2. Monitor and audit user-generated content and shortcode usage for suspicious or unexpected scripts. 3. Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads targeting the workable_jobs shortcode. 4. Apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 5. If possible, disable or remove the Workable Api plugin until a security patch is released. 6. Encourage the plugin vendor to release an update that properly sanitizes and escapes all user inputs and shortcode attributes. 7. Educate content contributors about safe input practices and the risks of injecting scripts. 8. Regularly review and update user permissions to ensure least privilege principles are enforced. 9. Conduct penetration testing focused on XSS vulnerabilities in WordPress plugins, especially those handling user input. 10. Keep WordPress core and all plugins updated to the latest versions to reduce exposure to known vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-07T18:59:20.763Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a22e1c560fa9d94d480

Added to database: 9/11/2025, 7:28:34 AM

Last enriched: 2/26/2026, 5:27:03 PM

Last updated: 3/25/2026, 8:43:55 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses