CVE-2025-1561

7.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious JavaScript into WordPress pages using the AppPresser plugin when logging is enabled. The injected scripts execute whenever users visit compromised pages, potentially stealing credentials or performing unauthorized actions. All WordPress sites using AppPresser plugin versions up to 4.4.10 are affected.

💻 Affected Systems

Products:
  • AppPresser – Mobile App Framework plugin for WordPress
Versions: All versions up to and including 4.4.10
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires logging to be enabled in the plugin configuration for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, take over the WordPress site, install backdoors, and compromise user data including personal information and payment details.

🟠

Likely Case

Attackers inject malicious scripts that steal session cookies, redirect users to phishing sites, or display unwanted advertisements.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability is prevented and no script injection occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires logging to be enabled and involves injecting scripts via the 'title' parameter

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.11

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3254632/apppresser/tags/4.4.11/inc/AppPresser_Log_Admin.php?old=3219464&old_path=apppresser%2Ftags%2F4.4.10%2Finc%2FAppPresser_Log_Admin.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find AppPresser plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.4.11 from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable AppPresser Logging

all

Temporarily disable logging functionality in AppPresser plugin settings to prevent exploitation

Disable AppPresser Plugin

WordPress CLI

Temporarily deactivate the AppPresser plugin until patched

wp plugin deactivate apppresser

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules
  • Add Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → AppPresser version. If version is 4.4.10 or lower, you are vulnerable.

Check Version:

wp plugin get apppresser --field=version

Verify Fix Applied:

After updating, verify AppPresser plugin version shows 4.4.11 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to AppPresser endpoints with script tags in 'title' parameter
  • JavaScript execution in unexpected contexts

Network Indicators:

  • Outbound connections to suspicious domains from your WordPress site
  • Unexpected script loads in page responses

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "apppresser") AND (http_method="POST" AND request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:")

🔗 References

📤 Share & Export