CVE-2025-15057

7.2 HIGH

📋 TL;DR

The SlimStat Analytics WordPress plugin has a stored XSS vulnerability in all versions up to 5.3.3. Unauthenticated attackers can inject malicious scripts via the fingerprint parameter, which execute when administrators view the Real-time Access Log report. This affects all WordPress sites using vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • SlimStat Analytics WordPress Plugin
Versions: All versions up to and including 5.3.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites with the SlimStat Analytics plugin installed and enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as administrators, install backdoors, or redirect users to malicious sites.

🟠

Likely Case

Attackers inject malicious scripts to steal administrator credentials or session tokens, leading to site compromise.

🟢

If Mitigated

With proper input validation and output escaping, the attack would be prevented entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit as it requires no authentication and uses a simple XSS payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.4

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3428488/wp-slimstat

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find SlimStat Analytics. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.3.4+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Real-time Access Log

all

Disable the vulnerable Real-time Access Log feature to prevent exploitation.

Temporary Input Sanitization

all

Add custom input sanitization for the 'fh' parameter in WordPress functions.php or a custom plugin.

add_filter('pre_update_option_slimstat_options', 'sanitize_fingerprint'); function sanitize_fingerprint($value) { if (isset($value['fh'])) { $value['fh'] = sanitize_text_field($value['fh']); } return $value; }

🧯 If You Can't Patch

  • Disable the SlimStat Analytics plugin entirely until patched.
  • Implement a web application firewall (WAF) rule to block requests containing script tags in the 'fh' parameter.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 5.3.3 or lower, it is vulnerable.

Check Version:

wp plugin list --name='SlimStat Analytics' --field=version (if WP-CLI is installed)

Verify Fix Applied:

After updating, verify the plugin version is 5.3.4 or higher in the WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual entries in WordPress or web server logs containing script tags or JavaScript in the 'fh' parameter.

Network Indicators:

  • HTTP requests to WordPress sites with suspicious payloads in the 'fh' parameter.

SIEM Query:

source="wordpress.log" AND "fh=" AND ("<script>" OR "javascript:")

🔗 References

📤 Share & Export