Skip to main content

CVE-2025-8896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor

Medium
VulnerabilityCVE-2025-8896cvecve-2025-8896cwe-79
Published: Sat Aug 16 2025 (08/16/2025, 06:39:22 UTC)
Source: CVE Database V5
Vendor/Project: cozmoslabs
Product: User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor

Description

The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gdpr_communication_preferences[]' parameter in all versions up to, and including, 3.14.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This is only exploitable when the GDPR Communication Preferences module is enabled and at least one GDPR Communication Preferences field has been added to the edit profile form.

AI-Powered Analysis

AILast updated: 08/24/2025, 01:08:30 UTC

Technical Analysis

CVE-2025-8896 is a stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor' developed by cozmoslabs. This vulnerability exists in all versions up to and including 3.14.3 and arises from improper input sanitization and output escaping of the 'gdpr_communication_preferences[]' parameter. Specifically, when the GDPR Communication Preferences module is enabled and at least one GDPR Communication Preferences field is added to the user profile edit form, authenticated users with Subscriber-level access or higher can inject arbitrary malicious scripts into the web pages. These scripts are stored persistently and executed whenever any user accesses the infected page, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed in the context of the victim's browser session. The vulnerability is exploitable remotely over the network without user interaction, requiring only low privileges (Subscriber role) to exploit, which broadens the attack surface within WordPress sites using this plugin. The CVSS v3.1 base score is 6.4 (medium severity), reflecting the network attack vector, low attack complexity, required privileges, no user interaction, and impact primarily on confidentiality and integrity, but not availability. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-79, which is a common and dangerous web application security flaw related to improper neutralization of input during web page generation.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those relying on WordPress websites with the affected plugin installed and the GDPR Communication Preferences module enabled. Since the vulnerability allows stored XSS attacks, it can lead to unauthorized access to user sessions, theft of sensitive data, and manipulation of user roles or content. This is especially critical for organizations handling personal data under GDPR regulations, as exploitation could result in data breaches and non-compliance penalties. The ability for low-privileged users to inject scripts increases the risk of insider threats or compromised accounts being leveraged for attacks. Additionally, the persistent nature of stored XSS means that multiple users can be affected over time, potentially damaging organizational reputation and trust. Given the widespread use of WordPress in Europe for business, governmental, and non-profit websites, the impact could extend to sectors such as finance, healthcare, education, and public administration. The vulnerability does not affect availability directly but compromises confidentiality and integrity, which are crucial for maintaining secure and trustworthy online services.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their WordPress installations to identify the presence of the 'User Profile Builder' plugin and verify if the GDPR Communication Preferences module is enabled with at least one GDPR field active. If so, they should upgrade the plugin to a patched version once available from the vendor or apply any official patches or workarounds. In the absence of an official patch, temporarily disabling the GDPR Communication Preferences module or removing GDPR fields from the profile forms can reduce exposure. Additionally, implementing a Web Application Firewall (WAF) with custom rules to detect and block malicious script payloads targeting the 'gdpr_communication_preferences[]' parameter can provide interim protection. Organizations should also enforce strict user role management and monitor for unusual activity from Subscriber-level accounts. Regular security audits and scanning for XSS vulnerabilities using automated tools can help detect exploitation attempts. Educating site administrators about the risks of enabling unnecessary modules and maintaining up-to-date plugins is essential. Finally, logging and monitoring web server and application logs for suspicious input patterns related to this parameter can aid in early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-12T17:33:58.596Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a02993ad5a09ad0075aa15

Added to database: 8/16/2025, 6:47:47 AM

Last enriched: 8/24/2025, 1:08:30 AM

Last updated: 9/30/2025, 6:13:12 AM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats