CVE-2025-30867
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into web pages generated by the SearchIQ WordPress plugin, which are then executed in victims' browsers. It affects all versions up to 4.7 of the SearchIQ plugin, potentially compromising users of WordPress sites running this plugin.
💻 Affected Systems
- SearchIQ WordPress plugin
📦 What is this software?
Searchiq by Searchiq
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, redirect users to malicious sites, or deface the website, leading to full account takeover or data theft.
Likely Case
Attackers inject scripts to steal user credentials or session tokens, enabling unauthorized access to user accounts.
If Mitigated
With proper input validation and output encoding, the risk is minimized, but outdated versions remain vulnerable.
🎯 Exploit Status
Stored XSS typically requires low complexity for exploitation, but specific exploit details are not publicly confirmed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 4.7 (check vendor for exact version)
Vendor Advisory: https://patchstack.com/database/wordpress/plugin/searchiq/vulnerability/wordpress-searchiq-plugin-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find SearchIQ and update to the latest version. 4. Verify update completes successfully.
🔧 Temporary Workarounds
Disable SearchIQ Plugin
allTemporarily deactivate the plugin to prevent exploitation until patched.
wp plugin deactivate searchiq
Implement WAF Rules
allConfigure web application firewall to block XSS payloads targeting SearchIQ endpoints.
🧯 If You Can't Patch
- Restrict access to the WordPress admin panel to trusted IP addresses only.
- Monitor logs for suspicious activity related to SearchIQ plugin inputs and outputs.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 4.7 or earlier, it is vulnerable.
Check Version:
wp plugin get searchiq --field=version
Verify Fix Applied:
After updating, confirm the plugin version is above 4.7 and test for XSS by attempting to inject scripts in search inputs.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to SearchIQ endpoints with script tags or JavaScript payloads in parameters.
Network Indicators:
- HTTP requests containing malicious scripts in search or input fields related to SearchIQ.
SIEM Query:
source="wordpress.log" AND "searchiq" AND ("<script>" OR "javascript:")