CVE-2025-9436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `trustindex` shortcode in all versions up to, and including, 13.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-9436 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Widgets for Google Reviews plugin for WordPress, developed by trustindex. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and output escaping of user-supplied attributes in the plugin's `trustindex` shortcode. This flaw affects all versions up to and including 13.2.1. An authenticated attacker with contributor-level access or higher can exploit this vulnerability by injecting arbitrary JavaScript code into pages via the shortcode. Because the malicious script is stored, it executes every time any user accesses the infected page, potentially allowing session hijacking, privilege escalation, defacement, or distribution of malware. The vulnerability has a CVSS v3.1 base score of 6.4, indicating medium severity. The attack vector is network-based (remote), with low attack complexity and requiring privileges (contributor or above), but no user interaction is needed. The scope is changed, meaning the vulnerability can affect components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site. No known public exploits have been reported yet. The vulnerability was reserved in August 2025 and published in December 2025, with no official patches currently available. The plugin is widely used to display Google Reviews on WordPress sites, making this a significant risk for websites relying on this functionality.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the Widgets for Google Reviews plugin on WordPress, especially those that allow multiple contributors to add or edit content. Exploitation could lead to unauthorized script execution in the context of the affected website, resulting in session hijacking, theft of sensitive user data, defacement, or distribution of malicious payloads to site visitors. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and cause operational disruptions. Organizations in sectors such as e-commerce, hospitality, and services that rely heavily on Google Reviews for customer engagement are particularly vulnerable. Since the attack requires contributor-level access, insider threats or compromised contributor accounts increase risk. The vulnerability's ability to affect the integrity and confidentiality of data without impacting availability means attackers can stealthily compromise sites without immediate detection. The lack of known exploits currently provides a window for mitigation, but the widespread use of WordPress and this plugin in Europe means many sites could be targeted once exploits emerge.
Mitigation Recommendations
1. Immediately audit user roles and permissions on WordPress sites using the Widgets for Google Reviews plugin, ensuring contributor-level access is granted only to trusted users. 2. Implement strict content moderation workflows to review any content or shortcode usage submitted by contributors before publishing. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode parameters or script injection attempts targeting the trustindex shortcode. 4. Monitor website logs for unusual shortcode usage patterns or unexpected script insertions. 5. Disable or remove the Widgets for Google Reviews plugin if it is not essential or replace it with an alternative plugin that has been verified as secure. 6. Stay alert for official patches or updates from the vendor and apply them promptly once released. 7. Educate content contributors about the risks of injecting untrusted code and enforce strong authentication mechanisms (e.g., MFA) to reduce the risk of account compromise. 8. Conduct regular security scans and penetration tests focusing on plugin vulnerabilities and XSS vectors. 9. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 10. Backup website data regularly to enable quick recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-9436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
Description
The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `trustindex` shortcode in all versions up to, and including, 13.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-9436 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Widgets for Google Reviews plugin for WordPress, developed by trustindex. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and output escaping of user-supplied attributes in the plugin's `trustindex` shortcode. This flaw affects all versions up to and including 13.2.1. An authenticated attacker with contributor-level access or higher can exploit this vulnerability by injecting arbitrary JavaScript code into pages via the shortcode. Because the malicious script is stored, it executes every time any user accesses the infected page, potentially allowing session hijacking, privilege escalation, defacement, or distribution of malware. The vulnerability has a CVSS v3.1 base score of 6.4, indicating medium severity. The attack vector is network-based (remote), with low attack complexity and requiring privileges (contributor or above), but no user interaction is needed. The scope is changed, meaning the vulnerability can affect components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site. No known public exploits have been reported yet. The vulnerability was reserved in August 2025 and published in December 2025, with no official patches currently available. The plugin is widely used to display Google Reviews on WordPress sites, making this a significant risk for websites relying on this functionality.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the Widgets for Google Reviews plugin on WordPress, especially those that allow multiple contributors to add or edit content. Exploitation could lead to unauthorized script execution in the context of the affected website, resulting in session hijacking, theft of sensitive user data, defacement, or distribution of malicious payloads to site visitors. This can damage brand reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and cause operational disruptions. Organizations in sectors such as e-commerce, hospitality, and services that rely heavily on Google Reviews for customer engagement are particularly vulnerable. Since the attack requires contributor-level access, insider threats or compromised contributor accounts increase risk. The vulnerability's ability to affect the integrity and confidentiality of data without impacting availability means attackers can stealthily compromise sites without immediate detection. The lack of known exploits currently provides a window for mitigation, but the widespread use of WordPress and this plugin in Europe means many sites could be targeted once exploits emerge.
Mitigation Recommendations
1. Immediately audit user roles and permissions on WordPress sites using the Widgets for Google Reviews plugin, ensuring contributor-level access is granted only to trusted users. 2. Implement strict content moderation workflows to review any content or shortcode usage submitted by contributors before publishing. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious shortcode parameters or script injection attempts targeting the trustindex shortcode. 4. Monitor website logs for unusual shortcode usage patterns or unexpected script insertions. 5. Disable or remove the Widgets for Google Reviews plugin if it is not essential or replace it with an alternative plugin that has been verified as secure. 6. Stay alert for official patches or updates from the vendor and apply them promptly once released. 7. Educate content contributors about the risks of injecting untrusted code and enforce strong authentication mechanisms (e.g., MFA) to reduce the risk of account compromise. 8. Conduct regular security scans and penetration tests focusing on plugin vulnerabilities and XSS vectors. 9. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 10. Backup website data regularly to enable quick recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-25T13:06:03.706Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693a3ebcbbbecd30a6fa3302
Added to database: 12/11/2025, 3:47:08 AM
Last enriched: 12/18/2025, 5:01:54 AM
Last updated: 2/7/2026, 9:34:19 AM
Views: 137
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.