Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9163: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in favethemes Houzez

0
Medium
VulnerabilityCVE-2025-9163cvecve-2025-9163cwe-79
Published: Wed Nov 26 2025 (11/26/2025, 12:30:05 UTC)
Source: CVE Database V5
Vendor/Project: favethemes
Product: Houzez

Description

The Houzez theme for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.1.6 due to insufficient input sanitization and output escaping in the houzez_property_img_upload() and houzez_property_attachment_upload() functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

AI-Powered Analysis

AILast updated: 11/26/2025, 12:54:25 UTC

Technical Analysis

CVE-2025-9163 is a stored cross-site scripting vulnerability identified in the Houzez WordPress theme developed by favethemes, affecting all versions up to and including 4.1.6. The vulnerability stems from insufficient sanitization and escaping of SVG file uploads handled by the houzez_property_img_upload() and houzez_property_attachment_upload() functions. SVG files can contain embedded scripts, and because the theme does not properly neutralize this input, an attacker can upload a crafted SVG file that contains malicious JavaScript code. This code is then stored on the server and executed in the context of any user who views the page containing the SVG image, leading to potential session hijacking, credential theft, or other malicious actions. The attack requires no authentication, making it accessible to unauthenticated attackers, but user interaction is necessary for the script to execute (i.e., a user must visit the affected page). The CVSS 3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but user interaction needed. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. Currently, there are no known exploits in the wild, and no official patches have been released at the time of publication. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation, a common cause of XSS vulnerabilities. Given the widespread use of WordPress and the popularity of the Houzez theme in real estate websites, this vulnerability could be leveraged to compromise site visitors and administrators alike.

Potential Impact

For European organizations, especially those operating real estate platforms or websites using the Houzez theme, this vulnerability poses a significant risk to confidentiality and integrity. Attackers can inject malicious scripts that execute in users' browsers, potentially stealing session cookies, redirecting users to phishing sites, or performing actions on behalf of authenticated users. This can lead to unauthorized access, data leakage, and reputational damage. Since the vulnerability does not affect availability directly, denial of service is less of a concern. However, the compromised trust and potential data breaches could have regulatory implications under GDPR, including fines and mandatory breach notifications. The fact that no authentication is required lowers the barrier for exploitation, increasing the risk profile. Organizations with high traffic and user engagement are at greater risk of impact. Additionally, the scope change means that the vulnerability could affect other components or data beyond the immediate upload functionality, increasing the potential attack surface.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify if the Houzez theme is in use and verify the version. Until an official patch is released, administrators should disable or restrict SVG file uploads, as SVGs are the attack vector. Implementing a strict whitelist of allowed file types for uploads can prevent malicious SVGs from being uploaded. Web application firewalls (WAFs) should be configured to detect and block suspicious SVG upload attempts and script injections. Employ Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of any injected scripts. Regularly monitor logs for unusual upload activity or user behavior indicative of exploitation attempts. Once patches become available, apply them promptly. Additionally, educate site administrators and users about the risks of clicking on suspicious links or interacting with untrusted content. Conduct security testing and code reviews focusing on input sanitization and output encoding in custom theme functions. Consider disabling SVG support entirely if not essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-19T13:18:40.338Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6926f4dc6359f79d7175be7d

Added to database: 11/26/2025, 12:38:52 PM

Last enriched: 11/26/2025, 12:54:25 PM

Last updated: 11/26/2025, 8:30:22 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats