CVE-2025-63045

6.5 MEDIUM

📋 TL;DR

This DOM-based Cross-Site Scripting (XSS) vulnerability in Master Slider Pro WordPress plugin allows attackers to inject malicious scripts into web pages viewed by other users. It affects WordPress sites using Master Slider Pro version 3.7.12 and earlier. Attackers can execute arbitrary JavaScript in victims' browsers when they visit compromised pages.

💻 Affected Systems

Products:
  • Master Slider Pro WordPress Plugin
Versions: <= 3.7.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with Master Slider Pro plugin enabled. Vulnerability exists in DOM manipulation without proper input sanitization.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on visitors' systems.

🟠

Likely Case

Session hijacking, credential theft, defacement of website content, or redirection to phishing pages.

🟢

If Mitigated

Limited impact if proper Content Security Policy (CSP) headers are implemented and user input validation is enforced elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

DOM-based XSS typically requires user interaction but can be exploited via crafted URLs or stored content. No public exploit code identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 3.7.12

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/masterslider/vulnerability/wordpress-master-slider-pro-plugin-3-7-12-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Master Slider Pro and click 'Update Now'. 4. Verify update to version >3.7.12. 5. Clear any caching plugins/CDN caches.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources and prevent inline script execution.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or configure in web server settings

Disable Plugin Temporarily

all

Deactivate Master Slider Pro until patched if slider functionality is not critical.

wp plugin deactivate masterslider-pro
Or deactivate via WordPress admin panel

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads in requests.
  • Monitor and filter user-generated content for script tags and JavaScript events.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Master Slider Pro version <= 3.7.12.

Check Version:

wp plugin list --name=masterslider-pro --field=version

Verify Fix Applied:

Confirm Master Slider Pro version is >3.7.12 in WordPress admin or via wp-cli: wp plugin list --name=masterslider-pro --field=version

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests with script tags or JavaScript events to slider-related endpoints
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script>, javascript:, or on* event handlers in parameters
  • Unusual outbound connections from user browsers after visiting slider pages

SIEM Query:

source="web_server" AND (uri="*masterslider*" OR uri="*mslider*") AND (request="*<script>*" OR request="*javascript:*" OR request="*onclick*" OR request="*onload*")

🔗 References

📤 Share & Export