CVE-2025-9075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns
The ZoloBlocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple Gutenberg blocks in versions up to, and including, 2.3.10. This is due to insufficient input sanitization and output escaping on user-supplied attributes within multiple block components including Google Maps markers, Lightbox captions, Image Gallery data attributes, Progress Pie prefix/suffix fields, and Text Path URL fields. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-9075 is a stored Cross-Site Scripting (XSS) vulnerability affecting the ZoloBlocks plugin for WordPress, specifically versions up to and including 2.3.10. ZoloBlocks is a Gutenberg block editor plugin that provides advanced blocks, dynamic content, templates, and patterns for WordPress sites. The vulnerability arises from improper neutralization of user-supplied input during web page generation (CWE-79). Multiple Gutenberg blocks within the plugin, including Google Maps markers, Lightbox captions, Image Gallery data attributes, Progress Pie prefix/suffix fields, and Text Path URL fields, fail to sufficiently sanitize and escape input. This flaw allows authenticated attackers with contributor-level access or higher to inject arbitrary JavaScript code into pages. Because the malicious scripts are stored in the content, they execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious activities. The CVSS v3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low complexity, and privileges at the contributor level, but does not require user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the confidentiality and integrity of user data on affected sites. No known exploits are currently reported in the wild, and no official patches have been linked yet, emphasizing the need for vigilance and proactive mitigation by site administrators.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using WordPress with the ZoloBlocks plugin, particularly those that allow contributor-level users to add or edit content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, deface websites, inject malicious redirects, or perform actions on behalf of legitimate users. This can damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and disrupt business operations. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce sites, the impact could be broad. The vulnerability's ability to affect multiple block components increases the attack surface. Additionally, the stored nature of the XSS means that even users with no special privileges visiting the infected pages may be affected, amplifying the risk. Organizations handling sensitive or regulated data must be particularly cautious, as exploitation could lead to regulatory penalties and loss of customer trust.
Mitigation Recommendations
Beyond generic advice, European organizations should: 1) Immediately audit their WordPress installations to identify the presence and version of the ZoloBlocks plugin. 2) Restrict contributor-level permissions to trusted users only and review user roles to minimize unnecessary privileges. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting known vulnerable block attributes. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 5) Monitor website content for unexpected script injections or anomalies in block data attributes. 6) Engage with the plugin vendor or community to obtain patches or updates as soon as they become available and apply them promptly. 7) Consider temporarily disabling or removing the plugin if immediate patching is not possible. 8) Educate content contributors about safe content practices and the risks of injecting untrusted code. 9) Use security plugins that scan for XSS vulnerabilities and malicious content injections regularly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Ireland
CVE-2025-9075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns
Description
The ZoloBlocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple Gutenberg blocks in versions up to, and including, 2.3.10. This is due to insufficient input sanitization and output escaping on user-supplied attributes within multiple block components including Google Maps markers, Lightbox captions, Image Gallery data attributes, Progress Pie prefix/suffix fields, and Text Path URL fields. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-9075 is a stored Cross-Site Scripting (XSS) vulnerability affecting the ZoloBlocks plugin for WordPress, specifically versions up to and including 2.3.10. ZoloBlocks is a Gutenberg block editor plugin that provides advanced blocks, dynamic content, templates, and patterns for WordPress sites. The vulnerability arises from improper neutralization of user-supplied input during web page generation (CWE-79). Multiple Gutenberg blocks within the plugin, including Google Maps markers, Lightbox captions, Image Gallery data attributes, Progress Pie prefix/suffix fields, and Text Path URL fields, fail to sufficiently sanitize and escape input. This flaw allows authenticated attackers with contributor-level access or higher to inject arbitrary JavaScript code into pages. Because the malicious scripts are stored in the content, they execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious activities. The CVSS v3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low complexity, and privileges at the contributor level, but does not require user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the confidentiality and integrity of user data on affected sites. No known exploits are currently reported in the wild, and no official patches have been linked yet, emphasizing the need for vigilance and proactive mitigation by site administrators.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using WordPress with the ZoloBlocks plugin, particularly those that allow contributor-level users to add or edit content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, deface websites, inject malicious redirects, or perform actions on behalf of legitimate users. This can damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and disrupt business operations. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce sites, the impact could be broad. The vulnerability's ability to affect multiple block components increases the attack surface. Additionally, the stored nature of the XSS means that even users with no special privileges visiting the infected pages may be affected, amplifying the risk. Organizations handling sensitive or regulated data must be particularly cautious, as exploitation could lead to regulatory penalties and loss of customer trust.
Mitigation Recommendations
Beyond generic advice, European organizations should: 1) Immediately audit their WordPress installations to identify the presence and version of the ZoloBlocks plugin. 2) Restrict contributor-level permissions to trusted users only and review user roles to minimize unnecessary privileges. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting known vulnerable block attributes. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 5) Monitor website content for unexpected script injections or anomalies in block data attributes. 6) Engage with the plugin vendor or community to obtain patches or updates as soon as they become available and apply them promptly. 7) Consider temporarily disabling or removing the plugin if immediate patching is not possible. 8) Educate content contributors about safe content practices and the risks of injecting untrusted code. 9) Use security plugins that scan for XSS vulnerabilities and malicious content injections regularly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-15T15:18:36.770Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dca0d55d588c52e5e0c389
Added to database: 10/1/2025, 3:32:37 AM
Last enriched: 10/1/2025, 3:47:42 AM
Last updated: 10/1/2025, 7:08:34 AM
Views: 7
Related Threats
CVE-2025-9512: CWE-79 Cross-Site Scripting (XSS) in Schema & Structured Data for WP & AMP
HighCVE-2025-10538: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LG Innotek Camera Model LND7210
HighCVE-2025-10744: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover File Manager, Code Editor, and Backup by Managefy
MediumCVE-2025-10735: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Block For Mailchimp – Easy Mailchimp Form Integration
MediumCVE-2025-11153: JIT miscompilation in the JavaScript Engine: JIT component in Mozilla Firefox
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.