CVE-2025-60182

7.1 HIGH

📋 TL;DR

This is a reflected cross-site scripting (XSS) vulnerability in the Schiocco Support Board WordPress plugin. Attackers can inject malicious scripts into web pages by tricking users into clicking specially crafted links. All WordPress sites using Support Board versions below 3.8.7 are affected.

💻 Affected Systems

Products:
  • Schiocco Support Board WordPress Plugin
Versions: All versions before 3.8.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Support Board plugin enabled. Vulnerability exists in web page generation where user input isn't properly sanitized.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress admin accounts, deface websites, or redirect users to malicious sites.

🟠

Likely Case

Attackers steal user session cookies or credentials, perform actions on behalf of authenticated users, or deliver malware through the compromised site.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited through phishing emails or malicious links. No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.8.7

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/supportboard/vulnerability/wordpress-support-board-plugin-3-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Support Board' and click 'Update Now'. 4. Verify version shows 3.8.7 or higher.

🔧 Temporary Workarounds

Disable Support Board Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate supportboard

Implement WAF Rules

all

Add web application firewall rules to block XSS payloads targeting Support Board endpoints

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use browser security features like HttpOnly and Secure flags for cookies

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Support Board version number. If version is below 3.8.7, system is vulnerable.

Check Version:

wp plugin get supportboard --field=version

Verify Fix Applied:

After updating, confirm Support Board version shows 3.8.7 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests containing script tags or JavaScript payloads to Support Board endpoints
  • Multiple failed login attempts following suspicious URL parameters

Network Indicators:

  • HTTP requests with suspicious parameters containing <script>, javascript:, or encoded payloads
  • Traffic patterns showing users being redirected to external domains after visiting Support Board pages

SIEM Query:

source="web_server_logs" AND (uri="*supportboard*" AND (param="*<script>*" OR param="*javascript:*" OR param="*onerror=*"))

🔗 References

📤 Share & Export