CVE-2025-46235

6.5 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in the SKT Blocks WordPress plugin allows attackers to inject malicious scripts into web pages. When users view pages containing the malicious content, their browsers execute the scripts, potentially compromising their accounts or sessions. All WordPress sites using SKT Blocks version 2.0 or earlier are affected.

💻 Affected Systems

Products:
  • SKT Blocks – Gutenberg based Page Builder WordPress plugin
Versions: All versions up to and including 2.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. No special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over websites, deface content, or redirect visitors to malicious sites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers inject malicious scripts that steal user session cookies or credentials, allowing account takeover of logged-in users and potential privilege escalation.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users, preventing execution and limiting impact to data corruption only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS vulnerabilities are commonly exploited. While no public PoC is confirmed, the vulnerability type is well-understood and weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.0 (check WordPress plugin repository for latest)

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/skt-blocks/vulnerability/wordpress-skt-blocks-gutenberg-based-page-builder-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'SKT Blocks – Gutenberg based Page Builder'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate skt-blocks

Content Security Policy

all

Implement CSP headers to restrict script execution

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Disable user content submission features that use the vulnerable plugin components

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → SKT Blocks version. If version is 2.0 or lower, you are vulnerable.

Check Version:

wp plugin get skt-blocks --field=version

Verify Fix Applied:

After update, verify plugin version is above 2.0. Test input fields that use the plugin to ensure scripts are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin-ajax.php or REST API endpoints with script tags
  • Multiple failed login attempts following suspicious content updates

Network Indicators:

  • Outbound connections to unknown domains from your WordPress site
  • Unexpected iframe or script tags in HTTP responses

SIEM Query:

source="wordpress.log" AND ("<script" OR "javascript:" OR "onload=" OR "onerror=")

🔗 References

📤 Share & Export