CVE-2025-9332: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in clickanatomy Interactive Human Anatomy with Clickable Body Parts
The Interactive Human Anatomy with Clickable Body Parts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-9332 is a medium-severity vulnerability classified as CWE-79, indicating an improper neutralization of input during web page generation, commonly known as Stored Cross-Site Scripting (XSS). This vulnerability affects the WordPress plugin 'Interactive Human Anatomy with Clickable Body Parts' by clickanatomy, specifically all versions up to and including 2.6. The flaw arises due to insufficient input sanitization and output escaping in the plugin's admin settings, allowing authenticated users with administrator-level permissions or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page. Notably, this vulnerability only manifests in WordPress multi-site installations or in single-site installations where the 'unfiltered_html' capability is disabled, which restricts users from posting unfiltered HTML content. The CVSS 3.1 base score is 5.5, reflecting a medium severity with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) but no impact on availability (A:N). There are no known exploits in the wild, and no patches have been linked yet. The vulnerability's exploitation requires administrative privileges, limiting the attack surface primarily to insiders or compromised admin accounts. However, once exploited, it can lead to persistent XSS attacks, potentially enabling session hijacking, privilege escalation, or distribution of malware through the affected WordPress sites.
Potential Impact
For European organizations using WordPress multi-site environments with the vulnerable Interactive Human Anatomy plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise user sessions, steal sensitive information, or manipulate site content. Given that exploitation requires administrator-level access, the primary threat vector is insider threats or attackers who have already gained elevated privileges through other means. The impact on confidentiality and integrity is low to medium but can be significant if attackers leverage the XSS to escalate privileges or conduct further attacks such as phishing or malware distribution. Since many European organizations use WordPress for public-facing websites, educational platforms, or intranet portals, exploitation could damage reputation, lead to data breaches, or disrupt business operations. The multi-site limitation means organizations running WordPress networks (common in universities, large enterprises, and government agencies) are more at risk. Additionally, the disabling of 'unfiltered_html' is a common security hardening practice, ironically making some installations more vulnerable to this flaw. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes public knowledge.
Mitigation Recommendations
Organizations should first verify if they use the Interactive Human Anatomy with Clickable Body Parts plugin in multi-site WordPress installations or have 'unfiltered_html' disabled. Immediate mitigation includes restricting administrator access to trusted personnel only and auditing admin accounts for suspicious activity. Since no official patches are currently linked, organizations should consider temporarily disabling or removing the plugin until a fix is released. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting this plugin can provide interim protection. Additionally, enabling Content Security Policy (CSP) headers can reduce the impact of XSS by restricting script execution sources. Regularly monitoring logs for unusual script injections or admin panel changes is recommended. Organizations should also educate administrators on the risks of injecting untrusted content and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Once a patch is available, prompt application is critical. Finally, reviewing and tightening WordPress user capabilities and permissions can minimize the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-9332: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in clickanatomy Interactive Human Anatomy with Clickable Body Parts
Description
The Interactive Human Anatomy with Clickable Body Parts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-9332 is a medium-severity vulnerability classified as CWE-79, indicating an improper neutralization of input during web page generation, commonly known as Stored Cross-Site Scripting (XSS). This vulnerability affects the WordPress plugin 'Interactive Human Anatomy with Clickable Body Parts' by clickanatomy, specifically all versions up to and including 2.6. The flaw arises due to insufficient input sanitization and output escaping in the plugin's admin settings, allowing authenticated users with administrator-level permissions or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page. Notably, this vulnerability only manifests in WordPress multi-site installations or in single-site installations where the 'unfiltered_html' capability is disabled, which restricts users from posting unfiltered HTML content. The CVSS 3.1 base score is 5.5, reflecting a medium severity with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) but no impact on availability (A:N). There are no known exploits in the wild, and no patches have been linked yet. The vulnerability's exploitation requires administrative privileges, limiting the attack surface primarily to insiders or compromised admin accounts. However, once exploited, it can lead to persistent XSS attacks, potentially enabling session hijacking, privilege escalation, or distribution of malware through the affected WordPress sites.
Potential Impact
For European organizations using WordPress multi-site environments with the vulnerable Interactive Human Anatomy plugin, this vulnerability poses a risk of persistent XSS attacks that can compromise user sessions, steal sensitive information, or manipulate site content. Given that exploitation requires administrator-level access, the primary threat vector is insider threats or attackers who have already gained elevated privileges through other means. The impact on confidentiality and integrity is low to medium but can be significant if attackers leverage the XSS to escalate privileges or conduct further attacks such as phishing or malware distribution. Since many European organizations use WordPress for public-facing websites, educational platforms, or intranet portals, exploitation could damage reputation, lead to data breaches, or disrupt business operations. The multi-site limitation means organizations running WordPress networks (common in universities, large enterprises, and government agencies) are more at risk. Additionally, the disabling of 'unfiltered_html' is a common security hardening practice, ironically making some installations more vulnerable to this flaw. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes public knowledge.
Mitigation Recommendations
Organizations should first verify if they use the Interactive Human Anatomy with Clickable Body Parts plugin in multi-site WordPress installations or have 'unfiltered_html' disabled. Immediate mitigation includes restricting administrator access to trusted personnel only and auditing admin accounts for suspicious activity. Since no official patches are currently linked, organizations should consider temporarily disabling or removing the plugin until a fix is released. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting this plugin can provide interim protection. Additionally, enabling Content Security Policy (CSP) headers can reduce the impact of XSS by restricting script execution sources. Regularly monitoring logs for unusual script injections or admin panel changes is recommended. Organizations should also educate administrators on the risks of injecting untrusted content and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Once a patch is available, prompt application is critical. Finally, reviewing and tightening WordPress user capabilities and permissions can minimize the attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-21T22:12:03.430Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dfb275c3835a5fbe033c55
Added to database: 10/3/2025, 11:24:37 AM
Last enriched: 10/3/2025, 11:29:49 AM
Last updated: 10/7/2025, 12:00:23 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34251: CWE-269 Improper Privilege Management in Tesla Telematics Control Unit (TCU)
HighCVE-2025-43824: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-61768: CWE-20: Improper Input Validation in xuemian168 kuno
MediumCVE-2025-59452: CWE-340 Generation of Predictable Numbers or Identifiers in YoSmart YoLink API
MediumCVE-2025-59451: CWE-863 Incorrect Authorization in YoSmart YoLink application
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.