CVE-2025-3888

6.4 MEDIUM

📋 TL;DR

The Jupiter X Core WordPress plugin has a stored XSS vulnerability in SVG file handling that allows authenticated attackers with Contributor access or higher to inject malicious scripts. These scripts execute when users view pages containing the malicious SVG files, potentially compromising user sessions and site integrity. All WordPress sites using Jupiter X Core versions up to 4.8.12 are affected.

💻 Affected Systems

Products:
  • Jupiter X Core WordPress Plugin
Versions: All versions up to and including 4.8.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Jupiter X Core plugin enabled and at least one user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers with contributor accounts inject malicious scripts to steal user session cookies, potentially compromising user accounts and spreading malware.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to isolated user sessions without administrative compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once attacker has Contributor-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.13

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3292376/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Jupiter X Core and click 'Update Now'. 4. Verify version is 4.8.13 or higher.

🔧 Temporary Workarounds

Disable SVG Uploads

all

Prevent SVG file uploads through WordPress media library

Add to wp-config.php: define('ALLOW_UNFILTERED_UPLOADS', false);
Add to functions.php: function disable_svg_upload($mimes) { unset($mimes['svg']); return $mimes; } add_filter('upload_mimes', 'disable_svg_upload');

Restrict User Roles

all

Limit users with Contributor or higher roles to trusted individuals only

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Regularly audit user accounts and remove unnecessary Contributor+ level access

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Jupiter X Core version. If version is 4.8.12 or lower, system is vulnerable.

Check Version:

wp plugin list --name=jupiterx-core --field=version

Verify Fix Applied:

After updating, verify Jupiter X Core version shows 4.8.13 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads by Contributor-level users
  • Multiple failed login attempts followed by SVG uploads

Network Indicators:

  • Unexpected JavaScript execution from SVG files
  • Suspicious outbound connections from pages containing SVG files

SIEM Query:

source="wordpress" (event="plugin_update" plugin="jupiterx-core" version<="4.8.12") OR (event="media_upload" file_extension="svg" user_role="contributor" OR user_role="author" OR user_role="editor")

🔗 References

📤 Share & Export