CVE-2025-2164

6.1 MEDIUM

📋 TL;DR

The pixelstats WordPress plugin contains a reflected cross-site scripting vulnerability in all versions up to 0.8.2. Unauthenticated attackers can inject malicious scripts via 'post_id' and 'sortby' parameters, potentially stealing user credentials or session cookies when victims click crafted links. WordPress sites using vulnerable pixelstats plugin versions are affected.

💻 Affected Systems

Products:
  • WordPress pixelstats plugin
Versions: All versions up to and including 0.8.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable pixelstats plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, take over WordPress sites, install backdoors, or redirect visitors to malicious sites.

🟠

Likely Case

Attackers steal user session cookies or credentials through phishing links, potentially compromising individual accounts.

🟢

If Mitigated

With proper web application firewalls and user awareness training, impact is limited to unsuccessful phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly weaponized in phishing campaigns due to low technical complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.8.3 or later

Vendor Advisory: https://wordpress.org/plugins/pixelstats/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find pixelstats plugin. 4. Click 'Update Now' if update available. 5. If no update, deactivate and delete plugin, then install latest version from WordPress repository.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block malicious XSS payloads in 'post_id' and 'sortby' parameters

Disable Plugin

linux

Temporarily deactivate pixelstats plugin until patched

wp plugin deactivate pixelstats

🧯 If You Can't Patch

  • Implement Content Security Policy headers to restrict script execution
  • Use web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for pixelstats version 0.8.2 or earlier

Check Version:

wp plugin list --name=pixelstats --field=version

Verify Fix Applied:

Confirm pixelstats plugin version is 0.8.3 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests with script tags in post_id or sortby parameters
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script> tags in query parameters
  • Suspicious URLs with encoded JavaScript payloads

SIEM Query:

source="web_logs" AND (uri_query="*post_id*<script>*" OR uri_query="*sortby*<script>*")

🔗 References

📤 Share & Export