CVE-2025-0629

4.8 MEDIUM

📋 TL;DR

This vulnerability in the Coronavirus (COVID-19) Notice Message WordPress plugin allows administrators to inject malicious scripts into plugin settings. These scripts execute when other users view the affected pages, enabling stored cross-site scripting attacks. The vulnerability affects WordPress sites using this plugin, particularly in multisite configurations where unfiltered_html is restricted.

💻 Affected Systems

Products:
  • Coronavirus (COVID-19) Notice Message WordPress plugin
Versions: through 1.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator-level access to exploit. Particularly relevant for WordPress multisite installations where unfiltered_html capability is restricted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Malicious administrators could inject scripts that affect other users viewing the notice messages, potentially stealing credentials or performing limited unauthorized actions.

🟢

If Mitigated

With proper user access controls and monitoring, impact is limited to administrators who would already have significant site access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative access to WordPress. The vulnerability is in plugin settings that don't properly sanitize input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.3 or later

Vendor Advisory: https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Coronavirus (COVID-19) Notice Message' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate the vulnerable plugin to prevent exploitation

wp plugin deactivate coronavirus-covid-19-notice-message

Remove Plugin

all

Completely remove the vulnerable plugin from the system

wp plugin delete coronavirus-covid-19-notice-message

🧯 If You Can't Patch

  • Restrict administrative access to only trusted users
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'Coronavirus (COVID-19) Notice Message' version 1.1.2 or earlier

Check Version:

wp plugin get coronavirus-covid-19-notice-message --field=version

Verify Fix Applied:

Verify plugin version is 1.1.3 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin setting modifications
  • Administrative users modifying notice message content with script tags

Network Indicators:

  • HTTP requests containing script tags in notice message parameters

SIEM Query:

source="wordpress" AND (plugin="coronavirus-covid-19-notice-message" AND version<="1.1.2")

🔗 References

📤 Share & Export