CVE-2025-67539

6.5 MEDIUM

📋 TL;DR

This DOM-based XSS vulnerability in the Select Core WordPress plugin allows attackers to inject malicious scripts into web pages viewed by other users. It affects all WordPress sites using Select Core plugin versions before 2.6. Attackers can steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • Select-Themes Select Core WordPress Plugin
Versions: All versions before 2.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. No special configuration needed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, data theft, or website defacement if admin users are targeted and execute malicious scripts.

🟠

Likely Case

Session hijacking, credential theft, or malicious redirects for regular users who visit compromised pages.

🟢

If Mitigated

Limited impact if proper Content Security Policy (CSP) headers are implemented and user input validation is enforced elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

DOM-based XSS typically requires user interaction but can be exploited via crafted links or stored content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/select-core/vulnerability/wordpress-select-core-plugin-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Select Core' plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 2.6+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources and prevent XSS payloads from running.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or add to wp-config.php: header("Content-Security-Policy: default-src 'self'; script-src 'self'");

Disable Plugin

all

Temporarily disable the Select Core plugin until patched.

wp plugin deactivate select-core
Or via WordPress admin: Plugins > Installed Plugins > Select Core > Deactivate

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads in requests.
  • Restrict plugin access to trusted users only and monitor for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Select Core version. If version is below 2.6, system is vulnerable.

Check Version:

wp plugin get select-core --field=version

Verify Fix Applied:

Confirm Select Core plugin version is 2.6 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests with script tags or JavaScript payloads to WordPress endpoints
  • Multiple failed login attempts followed by plugin-related requests

Network Indicators:

  • HTTP requests containing <script>, javascript:, or encoded XSS payloads in parameters
  • Unexpected outbound connections from WordPress server after plugin access

SIEM Query:

source="wordpress.log" AND ("select-core" OR "select_core") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export