CVE-2025-8906: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Tiktok Feed
The Widgets for Tiktok Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trustindex-feed' shortcode in all versions up to, and including, 1.7.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-8906 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Widgets for Tiktok Feed plugin for WordPress, affecting all versions up to and including 1.7.3. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of user-supplied attributes in the 'trustindex-feed' shortcode. This flaw allows authenticated users with contributor-level privileges or higher to inject arbitrary malicious scripts into pages. These scripts execute in the context of any user who views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions on behalf of the victim. The vulnerability does not require user interaction once the malicious content is stored and served, and it affects the confidentiality and integrity of user data. The CVSS 3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, privileges required (low), no user interaction, and a scope change due to impact beyond the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is particularly relevant for WordPress sites using this plugin to display TikTok feeds, which may be common among marketing, media, and influencer-related websites.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on WordPress sites with the Widgets for Tiktok Feed plugin to engage users or display social media content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of legitimate users, or deliver further malware payloads. This can damage organizational reputation, lead to data breaches involving user information, and disrupt website integrity. Given the plugin’s use in marketing and media sectors, organizations in these industries could face targeted attacks aiming to compromise customer trust or manipulate displayed content. The vulnerability’s requirement for contributor-level access limits exposure to insider threats or compromised accounts, but phishing or credential theft could facilitate such access. The scope change in the CVSS vector indicates that the impact extends beyond the plugin itself, potentially affecting the entire website and its users. European organizations must consider compliance implications under GDPR if personal data is compromised through such attacks.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate auditing of WordPress sites for the presence of the Widgets for Tiktok Feed plugin and identifying versions up to 1.7.3. 2) Restrict contributor-level and higher privileges strictly to trusted users, implementing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce risk of account compromise. 3) Monitor and sanitize all user-generated content and shortcode attributes before rendering, applying custom input validation and output encoding as a temporary measure until an official patch is released. 4) Employ Web Application Firewalls (WAFs) with rules targeting common XSS payloads and shortcode misuse patterns to block exploitation attempts. 5) Regularly review user roles and permissions to minimize unnecessary contributor-level access. 6) Prepare to apply vendor patches promptly once available and test updates in staging environments to avoid service disruption. 7) Conduct security awareness training for content contributors to recognize phishing and social engineering attempts that could lead to privilege escalation. 8) Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script sources.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8906: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Tiktok Feed
Description
The Widgets for Tiktok Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trustindex-feed' shortcode in all versions up to, and including, 1.7.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-8906 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Widgets for Tiktok Feed plugin for WordPress, affecting all versions up to and including 1.7.3. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and escaping of user-supplied attributes in the 'trustindex-feed' shortcode. This flaw allows authenticated users with contributor-level privileges or higher to inject arbitrary malicious scripts into pages. These scripts execute in the context of any user who views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions on behalf of the victim. The vulnerability does not require user interaction once the malicious content is stored and served, and it affects the confidentiality and integrity of user data. The CVSS 3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, privileges required (low), no user interaction, and a scope change due to impact beyond the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is particularly relevant for WordPress sites using this plugin to display TikTok feeds, which may be common among marketing, media, and influencer-related websites.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on WordPress sites with the Widgets for Tiktok Feed plugin to engage users or display social media content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of legitimate users, or deliver further malware payloads. This can damage organizational reputation, lead to data breaches involving user information, and disrupt website integrity. Given the plugin’s use in marketing and media sectors, organizations in these industries could face targeted attacks aiming to compromise customer trust or manipulate displayed content. The vulnerability’s requirement for contributor-level access limits exposure to insider threats or compromised accounts, but phishing or credential theft could facilitate such access. The scope change in the CVSS vector indicates that the impact extends beyond the plugin itself, potentially affecting the entire website and its users. European organizations must consider compliance implications under GDPR if personal data is compromised through such attacks.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate auditing of WordPress sites for the presence of the Widgets for Tiktok Feed plugin and identifying versions up to 1.7.3. 2) Restrict contributor-level and higher privileges strictly to trusted users, implementing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce risk of account compromise. 3) Monitor and sanitize all user-generated content and shortcode attributes before rendering, applying custom input validation and output encoding as a temporary measure until an official patch is released. 4) Employ Web Application Firewalls (WAFs) with rules targeting common XSS payloads and shortcode misuse patterns to block exploitation attempts. 5) Regularly review user roles and permissions to minimize unnecessary contributor-level access. 6) Prepare to apply vendor patches promptly once available and test updates in staging environments to avoid service disruption. 7) Conduct security awareness training for content contributors to recognize phishing and social engineering attempts that could lead to privilege escalation. 8) Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script sources.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-12T19:59:58.661Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d5f81a9e21be37e939ec7f
Added to database: 9/26/2025, 2:19:06 AM
Last enriched: 9/26/2025, 2:34:03 AM
Last updated: 9/26/2025, 3:21:10 AM
Views: 3
Related Threats
CVE-2025-9044: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mapster Mapster WP Maps
MediumCVE-2025-11000: NULL Pointer Dereference in Open Babel
MediumCVE-2025-10745: CWE-330 Use of Insufficiently Random Values in specialk Banhammer – Monitor Site Traffic, Block Bad Users and Bots
MediumCVE-2025-10377: CWE-352 Cross-Site Request Forgery (CSRF) in qriouslad System Dashboard
MediumCVE-2025-10173: CWE-862 Missing Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.