Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9116: CWE-79 Cross-Site Scripting (XSS) in WPS Visitor Counter Plugin

0
Medium
VulnerabilityCVE-2025-9116cvecve-2025-9116cwe-79
Published: Sat Dec 13 2025 (12/13/2025, 06:00:08 UTC)
Source: CVE Database V5
Product: WPS Visitor Counter Plugin

Description

The WPS Visitor Counter Plugin WordPress plugin through 1.4.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers.

AI-Powered Analysis

AILast updated: 12/13/2025, 06:21:15 UTC

Technical Analysis

CVE-2025-9116 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WPS Visitor Counter WordPress plugin, specifically in versions up to 1.4.8. The root cause is the plugin's failure to escape the $_SERVER['REQUEST_URI'] server variable before embedding it into an HTML attribute. This improper sanitization allows an attacker to craft a malicious URL containing JavaScript code that, when visited by a user on an affected site, executes within the victim's browser context. The vulnerability is particularly exploitable in older web browsers lacking modern XSS filters and protections. Reflected XSS can lead to various malicious outcomes including session hijacking, theft of cookies or credentials, website defacement, or redirecting users to phishing or malware sites. Although no public exploits or patches are currently available, the vulnerability is publicly disclosed and assigned CVE-2025-9116. The plugin is widely used in WordPress environments to track visitor counts, making it a common target. The lack of a CVSS score indicates the need for severity assessment based on impact and exploitability factors. The vulnerability requires no authentication but does require user interaction (clicking a crafted link).

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of user sessions and data on websites using the WPS Visitor Counter plugin. Attackers could exploit this flaw to steal session cookies, impersonate users, or inject malicious content, potentially damaging brand reputation and user trust. Organizations with customer-facing WordPress sites are particularly vulnerable, especially if their user base includes individuals using outdated browsers. The reflected XSS could also facilitate phishing attacks by redirecting users to malicious sites. While availability impact is limited, the overall risk to data security and user privacy is significant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed.

Mitigation Recommendations

1. Immediately audit WordPress sites for the presence of the WPS Visitor Counter plugin and identify affected versions (up to 1.4.8). 2. Apply any available patches or updates from the plugin developer as soon as they are released. 3. If no patch is available, implement manual input sanitization or disable the plugin temporarily. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious request patterns targeting the REQUEST_URI parameter. 5. Implement strict Content Security Policy (CSP) headers to restrict script execution sources and mitigate impact of XSS. 6. Encourage users to update to modern browsers with built-in XSS protections. 7. Conduct regular security testing and code reviews on WordPress plugins to detect similar issues proactively. 8. Educate website administrators about the risks of reflected XSS and safe plugin management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-08-18T13:56:12.969Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693d05d0fa0068b267cfe0a3

Added to database: 12/13/2025, 6:21:04 AM

Last enriched: 12/13/2025, 6:21:15 AM

Last updated: 12/14/2025, 12:28:16 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats