CVE-2025-9493: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in whiteshadow Admin Menu Editor
The Admin Menu Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder’ parameter in all versions up to, and including, 1.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-9493 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Admin Menu Editor plugin for WordPress, developed by whiteshadow. This vulnerability exists in all versions up to and including 1.14 of the plugin. The root cause is insufficient input sanitization and output escaping of the 'placeholder' parameter, which allows an authenticated attacker with Author-level privileges or higher to inject arbitrary JavaScript code into the plugin's pages. When any user accesses a page containing the injected script, it executes in their browser context. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating that the plugin fails to properly neutralize malicious input before rendering it in the web page. The CVSS v3.1 base score is 6.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, meaning the attack can be performed remotely over the network with low attack complexity, requires privileges (Author or higher), no user interaction is needed, and it impacts confidentiality and integrity with a scope change. No known exploits are currently reported in the wild. The vulnerability allows attackers to potentially steal session cookies, perform actions on behalf of other users, or conduct further attacks such as privilege escalation or phishing within the WordPress admin environment.
Potential Impact
For European organizations using WordPress sites with the vulnerable Admin Menu Editor plugin, this vulnerability poses a significant risk to the confidentiality and integrity of their web administration interfaces. Since the attack requires Author-level access, it targets insiders or compromised accounts rather than anonymous attackers. However, many organizations grant Author or higher roles to multiple users, increasing the attack surface. Exploitation could lead to unauthorized access to sensitive administrative functions, data leakage, or manipulation of site content. This is particularly critical for organizations handling personal data under GDPR, as exploitation could result in data breaches and regulatory penalties. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially compromised component, potentially impacting multiple users and systems. The lack of user interaction requirement means the attack can be automated and stealthy. While no known exploits exist yet, the medium severity score suggests that attackers may develop exploits, especially in targeted attacks against European entities with WordPress-based infrastructure.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Admin Menu Editor plugin and verify its version. If the plugin is present and at or below version 1.14, organizations should prioritize updating to a patched version once released by the vendor. In the absence of an official patch, temporary mitigations include restricting Author-level privileges to trusted users only, implementing strict role-based access controls, and monitoring user activity for suspicious behavior. Web Application Firewalls (WAFs) can be configured to detect and block suspicious input patterns targeting the 'placeholder' parameter. Additionally, organizations should enforce Content Security Policy (CSP) headers to limit the impact of injected scripts. Regular security training for users with elevated privileges can reduce the risk of credential compromise. Finally, monitoring logs for unusual script injections or anomalous admin page accesses can help detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9493: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in whiteshadow Admin Menu Editor
Description
The Admin Menu Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder’ parameter in all versions up to, and including, 1.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-9493 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Admin Menu Editor plugin for WordPress, developed by whiteshadow. This vulnerability exists in all versions up to and including 1.14 of the plugin. The root cause is insufficient input sanitization and output escaping of the 'placeholder' parameter, which allows an authenticated attacker with Author-level privileges or higher to inject arbitrary JavaScript code into the plugin's pages. When any user accesses a page containing the injected script, it executes in their browser context. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating that the plugin fails to properly neutralize malicious input before rendering it in the web page. The CVSS v3.1 base score is 6.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, meaning the attack can be performed remotely over the network with low attack complexity, requires privileges (Author or higher), no user interaction is needed, and it impacts confidentiality and integrity with a scope change. No known exploits are currently reported in the wild. The vulnerability allows attackers to potentially steal session cookies, perform actions on behalf of other users, or conduct further attacks such as privilege escalation or phishing within the WordPress admin environment.
Potential Impact
For European organizations using WordPress sites with the vulnerable Admin Menu Editor plugin, this vulnerability poses a significant risk to the confidentiality and integrity of their web administration interfaces. Since the attack requires Author-level access, it targets insiders or compromised accounts rather than anonymous attackers. However, many organizations grant Author or higher roles to multiple users, increasing the attack surface. Exploitation could lead to unauthorized access to sensitive administrative functions, data leakage, or manipulation of site content. This is particularly critical for organizations handling personal data under GDPR, as exploitation could result in data breaches and regulatory penalties. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially compromised component, potentially impacting multiple users and systems. The lack of user interaction requirement means the attack can be automated and stealthy. While no known exploits exist yet, the medium severity score suggests that attackers may develop exploits, especially in targeted attacks against European entities with WordPress-based infrastructure.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Admin Menu Editor plugin and verify its version. If the plugin is present and at or below version 1.14, organizations should prioritize updating to a patched version once released by the vendor. In the absence of an official patch, temporary mitigations include restricting Author-level privileges to trusted users only, implementing strict role-based access controls, and monitoring user activity for suspicious behavior. Web Application Firewalls (WAFs) can be configured to detect and block suspicious input patterns targeting the 'placeholder' parameter. Additionally, organizations should enforce Content Security Policy (CSP) headers to limit the impact of injected scripts. Regular security training for users with elevated privileges can reduce the risk of credential compromise. Finally, monitoring logs for unusual script injections or anomalous admin page accesses can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-26T17:32:55.400Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bbabc7844ddfa4289c96c3
Added to database: 9/6/2025, 3:34:31 AM
Last enriched: 9/6/2025, 3:35:00 AM
Last updated: 9/6/2025, 7:05:59 AM
Views: 6
Related Threats
CVE-2025-10028: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-9442: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in streamweasels StreamWeasels Kick Integration
MediumCVE-2025-9126: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in designful Smart Table Builder
MediumCVE-2025-8722: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pt-guy Content Views – Post Grid & Filter, Recent Posts, Category Posts … (Shortcode, Blocks, and Elementor Widgets)
MediumCVE-2025-8564: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sonalsinha21 SKT Addons for Elementor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.