CVE-2025-22284

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages generated by the LTL Freight Quotes – Unishippers Edition WordPress plugin. When users visit a specially crafted URL, the script executes in their browser, potentially stealing session cookies or performing actions on their behalf. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • LTL Freight Quotes – Unishippers Edition WordPress Plugin
Versions: All versions up to and including 2.5.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the plugin's web page generation where user input is not properly sanitized before being reflected in the output.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, deface websites, or redirect users to malicious sites to steal credentials or install malware.

🟠

Likely Case

Attackers would typically use this to steal user session cookies, perform phishing attacks, or redirect users to malicious content. The impact depends on the user's privileges when clicking the malicious link.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized and rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to trick a user into clicking a malicious link. The vulnerability is reflected XSS, meaning the malicious script comes from the request and is reflected back in the response.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.5.8

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/ltl-freight-quotes-unishippers-edition/vulnerability/wordpress-ltl-freight-quotes-unishippers-edition-plugin-2-5-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'LTL Freight Quotes – Unishippers Edition'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Input Validation Web Application Firewall Rule

all

Configure WAF to block requests containing suspicious script patterns in URL parameters

Disable Plugin Temporarily

WordPress

Deactivate the plugin until patching is possible

wp plugin deactivate ltl-freight-quotes-unishippers-edition

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources
  • Use browser security extensions that block reflected XSS attacks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → LTL Freight Quotes – Unishippers Edition version number. If version is 2.5.8 or lower, you are vulnerable.

Check Version:

wp plugin get ltl-freight-quotes-unishippers-edition --field=version

Verify Fix Applied:

After updating, verify the plugin version shows higher than 2.5.8 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs with script tags in parameters
  • Multiple failed requests to plugin endpoints with suspicious parameters

Network Indicators:

  • HTTP requests containing <script> tags or javascript: protocol in URL parameters
  • Unexpected redirects from plugin pages

SIEM Query:

source="web_server" AND (url="*<script>*" OR url="*javascript:*") AND url="*/wp-content/plugins/ltl-freight-quotes-unishippers-edition/*"

🔗 References

📤 Share & Export