CVE-2025-3888
📋 TL;DR
The Jupiter X Core WordPress plugin has a stored XSS vulnerability in SVG file handling that allows authenticated attackers with Contributor access or higher to inject malicious scripts. These scripts execute when users view pages containing the malicious SVG files, potentially compromising user sessions and site integrity. All WordPress sites using Jupiter X Core versions up to 4.8.12 are affected.
💻 Affected Systems
- Jupiter X Core WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.
Likely Case
Attackers with contributor accounts inject malicious scripts to steal user session cookies, potentially compromising user accounts and spreading malware.
If Mitigated
With proper user access controls and content security policies, impact is limited to isolated user sessions without administrative compromise.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once attacker has Contributor-level credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.8.13
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3292376/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Jupiter X Core and click 'Update Now'. 4. Verify version is 4.8.13 or higher.
🔧 Temporary Workarounds
Disable SVG Uploads
allPrevent SVG file uploads through WordPress media library
Add to wp-config.php: define('ALLOW_UNFILTERED_UPLOADS', false);
Add to functions.php: function disable_svg_upload($mimes) { unset($mimes['svg']); return $mimes; } add_filter('upload_mimes', 'disable_svg_upload');
Restrict User Roles
allLimit users with Contributor or higher roles to trusted individuals only
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Regularly audit user accounts and remove unnecessary Contributor+ level access
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for Jupiter X Core version. If version is 4.8.12 or lower, system is vulnerable.
Check Version:
wp plugin list --name=jupiterx-core --field=version
Verify Fix Applied:
After updating, verify Jupiter X Core version shows 4.8.13 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual SVG file uploads by Contributor-level users
- Multiple failed login attempts followed by SVG uploads
Network Indicators:
- Unexpected JavaScript execution from SVG files
- Suspicious outbound connections from pages containing SVG files
SIEM Query:
source="wordpress" (event="plugin_update" plugin="jupiterx-core" version<="4.8.12") OR (event="media_upload" file_extension="svg" user_role="contributor" OR user_role="author" OR user_role="editor")
🔗 References
- https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/inline-svg/widgets/inline-svg.php#L304
- https://plugins.trac.wordpress.org/changeset/3292376/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f36f1ea5-62f7-48f0-a8d3-a56e0c9915d7?source=cve