CVE-2025-14554

7.2 HIGH

📋 TL;DR

This stored XSS vulnerability in the Sell BTC WordPress plugin allows unauthenticated attackers to inject malicious scripts into order records. When administrators view the Orders page in the WordPress dashboard, these scripts execute in their browser session. All WordPress sites using this plugin up to version 1.5 are affected.

💻 Affected Systems

Products:
  • Sell BTC - Cryptocurrency Selling Calculator WordPress plugin
Versions: All versions up to and including 1.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active. The Orders page must be accessible to administrators.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full WordPress site takeover, data theft, or malware distribution to site visitors.

🟠

Likely Case

Session hijacking of administrator accounts, defacement of admin pages, or theft of sensitive order data.

🟢

If Mitigated

Limited impact with proper CSP headers and admin session security, though XSS payloads could still execute.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting malicious order data via the 'orderform_data' AJAX endpoint. The vulnerability is partially patched in version 1.5, suggesting ongoing security issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.5 (check WordPress plugin repository for latest)

Vendor Advisory: https://plugins.trac.wordpress.org/browser/sell-btc-by-hayyatapps/

Restart Required: No

Instructions:

1. Log into WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Sell BTC - Cryptocurrency Selling Calculator'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress plugin repository and replace files.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

linux

Temporarily block access to the vulnerable 'orderform_data' AJAX action via .htaccess or web server configuration.

# Add to .htaccess: RewriteRule ^wp-admin/admin-ajax\.php\?action=orderform_data - [F]

Deactivate plugin

all

Completely disable the plugin until patched version is available.

wp plugin deactivate sell-btc-by-hayyatapps

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to block inline script execution
  • Restrict admin dashboard access to specific IP addresses using web server rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Sell BTC' plugin version 1.5 or earlier.

Check Version:

wp plugin list --name=sell-btc-by-hayyatapps --field=version

Verify Fix Applied:

After update, verify plugin version is greater than 1.5 and test order submission functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=orderform_data containing script tags
  • Multiple failed order submissions with JavaScript payloads

Network Indicators:

  • HTTP requests with base64-encoded or obfuscated JavaScript in order data parameters

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "orderform_data" AND ("<script>" OR "javascript:")

🔗 References

📤 Share & Export