CVE-2025-9030: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in maneshtimilsina Majestic Before After Image
The Majestic Before After Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'before_label' and 'after_label' parameters in versions less than, or equal to, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-9030 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Majestic Before After Image plugin for WordPress, developed by maneshtimilsina. This vulnerability exists in versions up to and including 2.0.1 due to improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'before_label' and 'after_label' parameters. An authenticated attacker with contributor-level or higher privileges can exploit this flaw by injecting malicious JavaScript code into these parameters. Because the vulnerability is stored, the injected script is saved in the WordPress database and executed whenever any user accesses the affected page, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but does require privileges (PR:L) and no user interaction (UI:N). The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches are listed yet. The vulnerability is classified under CWE-79, a common and well-understood XSS weakness. This vulnerability is particularly dangerous in multi-user WordPress environments where contributors can add or edit content, as it allows persistent script injection that affects all visitors to the compromised pages.
Potential Impact
For European organizations using WordPress sites with the Majestic Before After Image plugin, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive information such as user session tokens or personal data, undermining confidentiality. Integrity of website content could be compromised by injecting misleading or malicious content, damaging organizational reputation and trust. Although availability is not directly impacted, the indirect effects such as blacklisting by search engines or browsers due to malicious content could disrupt normal operations. Organizations in sectors with strict data protection regulations like GDPR may face compliance issues and potential fines if user data is compromised. Since the attack requires contributor-level access, insider threats or compromised contributor accounts increase risk. The vulnerability could be leveraged in targeted attacks against European businesses relying on WordPress for marketing, e-commerce, or customer engagement, especially those with multiple content contributors.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the Majestic Before After Image plugin and verify the version. Until an official patch is released, restrict contributor-level access to trusted users only and implement strict access controls and monitoring on user accounts with content editing privileges. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'before_label' and 'after_label' parameters. Conduct regular security scans focusing on stored XSS indicators in WordPress content. Educate content contributors about the risks of injecting untrusted input and enforce input validation policies. Once a patch becomes available, prioritize prompt updating of the plugin. Additionally, implement Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution sources. Regularly backup website data to enable quick restoration if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9030: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in maneshtimilsina Majestic Before After Image
Description
The Majestic Before After Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'before_label' and 'after_label' parameters in versions less than, or equal to, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-9030 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Majestic Before After Image plugin for WordPress, developed by maneshtimilsina. This vulnerability exists in versions up to and including 2.0.1 due to improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'before_label' and 'after_label' parameters. An authenticated attacker with contributor-level or higher privileges can exploit this flaw by injecting malicious JavaScript code into these parameters. Because the vulnerability is stored, the injected script is saved in the WordPress database and executed whenever any user accesses the affected page, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but does require privileges (PR:L) and no user interaction (UI:N). The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches are listed yet. The vulnerability is classified under CWE-79, a common and well-understood XSS weakness. This vulnerability is particularly dangerous in multi-user WordPress environments where contributors can add or edit content, as it allows persistent script injection that affects all visitors to the compromised pages.
Potential Impact
For European organizations using WordPress sites with the Majestic Before After Image plugin, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive information such as user session tokens or personal data, undermining confidentiality. Integrity of website content could be compromised by injecting misleading or malicious content, damaging organizational reputation and trust. Although availability is not directly impacted, the indirect effects such as blacklisting by search engines or browsers due to malicious content could disrupt normal operations. Organizations in sectors with strict data protection regulations like GDPR may face compliance issues and potential fines if user data is compromised. Since the attack requires contributor-level access, insider threats or compromised contributor accounts increase risk. The vulnerability could be leveraged in targeted attacks against European businesses relying on WordPress for marketing, e-commerce, or customer engagement, especially those with multiple content contributors.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the Majestic Before After Image plugin and verify the version. Until an official patch is released, restrict contributor-level access to trusted users only and implement strict access controls and monitoring on user accounts with content editing privileges. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'before_label' and 'after_label' parameters. Conduct regular security scans focusing on stored XSS indicators in WordPress content. Educate content contributors about the risks of injecting untrusted input and enforce input validation policies. Once a patch becomes available, prioritize prompt updating of the plugin. Additionally, implement Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution sources. Regularly backup website data to enable quick restoration if compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-14T10:41:34.788Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0877c11971642e85b347a
Added to database: 10/4/2025, 2:33:32 AM
Last enriched: 10/4/2025, 2:48:46 AM
Last updated: 10/4/2025, 3:35:52 AM
Views: 4
Related Threats
CVE-2025-9952: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-9886: CWE-352 Cross-Site Request Forgery (CSRF) in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-10383: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-61895
LowCVE-2025-61894
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.