CVE-2025-58674

5.9 MEDIUM

📋 TL;DR

This is a stored cross-site scripting (XSS) vulnerability in WordPress core that allows attackers with Author-level privileges or higher to inject malicious scripts into web pages. The vulnerability affects WordPress versions from 4.7 through 6.8.2, potentially impacting millions of WordPress sites worldwide.

💻 Affected Systems

Products:
  • WordPress
Versions: WordPress 4.7 through 6.8.2 (all versions in between)
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations within the affected version range are vulnerable by default. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compromised author credentials could inject malicious scripts that steal administrator credentials, deface websites, or redirect visitors to malicious sites, potentially affecting all site visitors.

🟠

Likely Case

Limited impact since exploitation requires author-level access; most likely used in targeted attacks against specific organizations or in conjunction with other vulnerabilities.

🟢

If Mitigated

With proper user access controls and content sanitization, impact is minimal as only trusted users can exploit the vulnerability.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires author-level privileges, making it less accessible to external attackers without initial access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WordPress 6.8.3 or later

Vendor Advisory: https://wordpress.org/news/2025/09/wordpress-6-8-3-release/

Restart Required: No

Instructions:

1. Backup your WordPress site and database. 2. Navigate to Dashboard > Updates. 3. Click 'Update Now' to upgrade to WordPress 6.8.3 or later. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict User Privileges

all

Limit author-level access to only trusted users and implement principle of least privilege

Implement Content Security Policy

all

Add CSP headers to mitigate potential XSS impact

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or add to wp-config.php: header("Content-Security-Policy: default-src 'self'; script-src 'self'");

🧯 If You Can't Patch

  • Implement strict user access controls and audit all author-level accounts
  • Deploy web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress version in Dashboard > Updates or via wp-admin/includes/update.php

Check Version:

wp core version (if WP-CLI installed) or check Dashboard > Updates

Verify Fix Applied:

Verify WordPress version is 6.8.3 or later in Dashboard > Updates

📡 Detection & Monitoring

Log Indicators:

  • Unusual content modifications by author-level users
  • Suspicious script tags in post/page content

Network Indicators:

  • Unexpected external script loads from WordPress pages

SIEM Query:

source="wordpress" AND (event="post_modified" OR event="page_modified") AND user_role="author" AND content CONTAINS "<script>"

🔗 References

📤 Share & Export