CVE-2025-5699

5.5 MEDIUM

📋 TL;DR

The Developer Formatter WordPress plugin has a stored cross-site scripting vulnerability in Custom CSS functionality. Authenticated attackers with administrator privileges can inject malicious scripts that execute when users view affected pages. This only impacts WordPress multi-site installations or sites where unfiltered_html capability is disabled.

💻 Affected Systems

Products:
  • Developer Formatter WordPress Plugin
Versions: All versions up to and including 2015.0.2.1
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only affects WordPress multi-site installations OR installations where unfiltered_html capability is disabled

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full site takeover, data theft, or malware distribution to visitors.

🟠

Likely Case

Session hijacking, credential theft, or defacement of affected WordPress pages.

🟢

If Mitigated

Limited impact due to requiring administrator access and specific WordPress configurations.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires administrator-level WordPress access and specific WordPress configuration

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2015.0.2.1

Vendor Advisory: https://wordpress.org/plugins/devformatter/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Developer Formatter plugin. 4. Click Update Now or manually update to latest version. 5. Verify plugin is updated to version newer than 2015.0.2.1.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Developer Formatter plugin until patched

wp plugin deactivate devformatter

Enable unfiltered_html

all

Enable unfiltered_html capability for administrators (not recommended for security)

Add define('DISALLOW_UNFILTERED_HTML', false); to wp-config.php

🧯 If You Can't Patch

  • Remove administrator access from untrusted users
  • Implement web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Developer Formatter version. If version is 2015.0.2.1 or older, you are vulnerable.

Check Version:

wp plugin list --name=devformatter --field=version

Verify Fix Applied:

Verify plugin version is newer than 2015.0.2.1 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator activity modifying CSS settings
  • Suspicious script tags in plugin configuration logs

Network Indicators:

  • Unexpected JavaScript execution from WordPress admin pages
  • Suspicious outbound connections from admin sessions

SIEM Query:

source="wordpress" AND ("devformatter" OR "devfmt_css") AND ("update" OR "modify" OR "inject")

🔗 References

📤 Share & Export