Skip to main content

CVE-2025-9030: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in maneshtimilsina Majestic Before After Image

Medium
VulnerabilityCVE-2025-9030cvecve-2025-9030cwe-79
Published: Sat Oct 04 2025 (10/04/2025, 02:24:37 UTC)
Source: CVE Database V5
Vendor/Project: maneshtimilsina
Product: Majestic Before After Image

Description

The Majestic Before After Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'before_label' and 'after_label' parameters in versions less than, or equal to, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 10/04/2025, 02:48:46 UTC

Technical Analysis

CVE-2025-9030 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Majestic Before After Image plugin for WordPress, developed by maneshtimilsina. This vulnerability exists in versions up to and including 2.0.1 due to improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'before_label' and 'after_label' parameters. An authenticated attacker with contributor-level or higher privileges can exploit this flaw by injecting malicious JavaScript code into these parameters. Because the vulnerability is stored, the injected script is saved in the WordPress database and executed whenever any user accesses the affected page, potentially leading to session hijacking, privilege escalation, or redirection to malicious sites. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but does require privileges (PR:L) and no user interaction (UI:N). The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches are listed yet. The vulnerability is classified under CWE-79, a common and well-understood XSS weakness. This vulnerability is particularly dangerous in multi-user WordPress environments where contributors can add or edit content, as it allows persistent script injection that affects all visitors to the compromised pages.

Potential Impact

For European organizations using WordPress sites with the Majestic Before After Image plugin, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive information such as user session tokens or personal data, undermining confidentiality. Integrity of website content could be compromised by injecting misleading or malicious content, damaging organizational reputation and trust. Although availability is not directly impacted, the indirect effects such as blacklisting by search engines or browsers due to malicious content could disrupt normal operations. Organizations in sectors with strict data protection regulations like GDPR may face compliance issues and potential fines if user data is compromised. Since the attack requires contributor-level access, insider threats or compromised contributor accounts increase risk. The vulnerability could be leveraged in targeted attacks against European businesses relying on WordPress for marketing, e-commerce, or customer engagement, especially those with multiple content contributors.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations for the presence of the Majestic Before After Image plugin and verify the version. Until an official patch is released, restrict contributor-level access to trusted users only and implement strict access controls and monitoring on user accounts with content editing privileges. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'before_label' and 'after_label' parameters. Conduct regular security scans focusing on stored XSS indicators in WordPress content. Educate content contributors about the risks of injecting untrusted input and enforce input validation policies. Once a patch becomes available, prioritize prompt updating of the plugin. Additionally, implement Content Security Policy (CSP) headers to reduce the impact of any injected scripts by restricting script execution sources. Regularly backup website data to enable quick restoration if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-14T10:41:34.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0877c11971642e85b347a

Added to database: 10/4/2025, 2:33:32 AM

Last enriched: 10/4/2025, 2:48:46 AM

Last updated: 10/4/2025, 3:35:52 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats