CVE-2025-9061: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mikado Themes Wilmer Core
The Wilmer Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-9061 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Wilmer Core plugin for WordPress, developed by Mikado Themes. This vulnerability exists in versions up to and including 2.4.5 due to improper input sanitization and insufficient output escaping of user-supplied attributes within shortcodes. Specifically, authenticated users with contributor-level or higher permissions can inject arbitrary JavaScript code into pages via crafted shortcode attributes. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability is exploitable remotely over the network without user interaction beyond visiting the infected page, and requires low privileges (contributor or above) to exploit. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and no user interaction required. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the confidentiality and integrity of the WordPress site and its users. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on manual hardening or awaiting vendor updates. This vulnerability leverages CWE-79, a common web application security weakness related to improper neutralization of input during web page generation, which is a frequent cause of XSS issues in web applications and plugins.
Potential Impact
For European organizations using WordPress sites with the Wilmer Core plugin, this vulnerability poses a significant risk to website integrity and user trust. Attackers with contributor-level access—often granted to content creators or editors—can inject malicious scripts that execute in the browsers of site visitors, including administrators and customers. This can lead to theft of authentication cookies, unauthorized actions performed under victim credentials, defacement, or redirection to malicious sites. The confidentiality of user data and the integrity of website content can be compromised, potentially damaging brand reputation and violating data protection regulations such as GDPR if personal data is exposed or manipulated. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the organization's network if internal users are targeted. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce websites, the impact can be broad, especially for organizations that rely on contributor roles for content management without strict privilege controls.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Wilmer Core plugin and verify the version in use. Until an official patch is released, organizations should restrict contributor-level permissions to trusted users only and consider temporarily disabling or removing the Wilmer Core plugin if feasible. Implementing a Web Application Firewall (WAF) with custom rules to detect and block suspicious shortcode attributes or script injection attempts can provide interim protection. Additionally, applying strict Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Organizations should also educate content contributors about the risks of injecting untrusted content and monitor website logs for unusual shortcode usage patterns. Once a vendor patch becomes available, prompt application of updates is critical. Regular security scanning and penetration testing focused on plugin vulnerabilities should be incorporated into the security lifecycle to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9061: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mikado Themes Wilmer Core
Description
The Wilmer Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-9061 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Wilmer Core plugin for WordPress, developed by Mikado Themes. This vulnerability exists in versions up to and including 2.4.5 due to improper input sanitization and insufficient output escaping of user-supplied attributes within shortcodes. Specifically, authenticated users with contributor-level or higher permissions can inject arbitrary JavaScript code into pages via crafted shortcode attributes. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability is exploitable remotely over the network without user interaction beyond visiting the infected page, and requires low privileges (contributor or above) to exploit. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and no user interaction required. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the confidentiality and integrity of the WordPress site and its users. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on manual hardening or awaiting vendor updates. This vulnerability leverages CWE-79, a common web application security weakness related to improper neutralization of input during web page generation, which is a frequent cause of XSS issues in web applications and plugins.
Potential Impact
For European organizations using WordPress sites with the Wilmer Core plugin, this vulnerability poses a significant risk to website integrity and user trust. Attackers with contributor-level access—often granted to content creators or editors—can inject malicious scripts that execute in the browsers of site visitors, including administrators and customers. This can lead to theft of authentication cookies, unauthorized actions performed under victim credentials, defacement, or redirection to malicious sites. The confidentiality of user data and the integrity of website content can be compromised, potentially damaging brand reputation and violating data protection regulations such as GDPR if personal data is exposed or manipulated. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the organization's network if internal users are targeted. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce websites, the impact can be broad, especially for organizations that rely on contributor roles for content management without strict privilege controls.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Wilmer Core plugin and verify the version in use. Until an official patch is released, organizations should restrict contributor-level permissions to trusted users only and consider temporarily disabling or removing the Wilmer Core plugin if feasible. Implementing a Web Application Firewall (WAF) with custom rules to detect and block suspicious shortcode attributes or script injection attempts can provide interim protection. Additionally, applying strict Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Organizations should also educate content contributors about the risks of injecting untrusted content and monitor website logs for unusual shortcode usage patterns. Once a vendor patch becomes available, prompt application of updates is critical. Regular security scanning and penetration testing focused on plugin vulnerabilities should be incorporated into the security lifecycle to detect similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-15T12:27:38.754Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c080a332300b81c82d9681
Added to database: 9/9/2025, 7:31:47 PM
Last enriched: 9/9/2025, 7:35:11 PM
Last updated: 9/9/2025, 7:35:11 PM
Views: 2
Related Threats
CVE-2025-54084: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Calix GigaCenter ONT
HighCVE-2025-53913: CWE-269 Improper Privilege Management in Calix GigaCenter ONT
HighCVE-2025-59037: CWE-506: Embedded Malicious Code in duckdb duckdb-node
HighCVE-2025-54083: CWE-922 Insecure Storage of Sensitive Information in Calix GigaCenter ONT
MediumCVE-2025-44595: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.