CVE-2025-9163

6.1 MEDIUM

📋 TL;DR

The Houzez WordPress theme allows unauthenticated attackers to upload malicious SVG files containing JavaScript that executes when viewed. This stored XSS vulnerability affects all WordPress sites using Houzez theme versions 4.1.6 and earlier.

💻 Affected Systems

Products:
  • Houzez WordPress Theme
Versions: All versions up to and including 4.1.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Houzez theme installed and file upload functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin credentials, deface websites, redirect users to malicious sites, or perform actions as authenticated users.

🟠

Likely Case

Attackers inject malicious scripts to steal session cookies or user data from visitors viewing the SVG files.

🟢

If Mitigated

With proper file upload restrictions and content security policies, impact is limited to potential data leakage from users who view malicious files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires uploading SVG files with embedded JavaScript, which is trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.7 or later

Vendor Advisory: https://favethemes.zendesk.com/hc/en-us/articles/360041639432-Changelog

Restart Required: No

Instructions:

1. Update Houzez theme to version 4.1.7 or later via WordPress admin panel. 2. Verify update completed successfully. 3. Clear any cached SVG files.

🔧 Temporary Workarounds

Block SVG Uploads

all

Prevent SVG file uploads via .htaccess or web server configuration

Add to .htaccess: <FilesMatch "\.svg$">
    Order Allow,Deny
    Deny from all
</FilesMatch>

Content Security Policy

all

Implement CSP headers to block inline script execution in SVG files

Add to web server config: Header set Content-Security-Policy "script-src 'self'"
Add to .htaccess: Header set Content-Security-Policy "script-src 'self'"

🧯 If You Can't Patch

  • Disable SVG file upload functionality in WordPress settings or via plugin
  • Implement web application firewall rules to block malicious SVG uploads

🔍 How to Verify

Check if Vulnerable:

Check Houzez theme version in WordPress admin panel under Appearance > Themes

Check Version:

WordPress CLI: wp theme list --field=name,version | grep houzez

Verify Fix Applied:

Verify theme version is 4.1.7 or later and test SVG upload with script tags to confirm sanitization

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads
  • Multiple failed upload attempts
  • Requests to uploaded SVG files with suspicious parameters

Network Indicators:

  • POST requests to upload endpoints with SVG content
  • GET requests to uploaded SVG files

SIEM Query:

source="wordpress.log" AND ("svg" AND "upload") OR ("houzez" AND "attachment")

🔗 References

📤 Share & Export