CVE-2025-23500
Published: 22 January 2025
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in faaiq Simple Custom post type custom field simple-content-construction-kit allows Reflected XSS.This issue affects Simple Custom post type custom field: from n/a through <= 1.0.3.
Security Summary
CVE-2025-23500 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the WordPress plugin "Simple Custom post type custom field," also referred to as simple-content-construction-kit by faaiq. This issue affects all versions of the plugin from n/a through 1.0.3. Published on 2025-01-22, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility, low attack complexity, and scope change.
Unauthenticated attackers can exploit this vulnerability remotely by crafting malicious inputs that are reflected in web page generation without proper neutralization. Exploitation requires user interaction, such as a victim clicking a malicious link or submitting tainted input, allowing arbitrary JavaScript execution in the context of the affected site. This can result in low-level impacts to confidentiality (e.g., session token theft), integrity (e.g., data manipulation), and availability, with the changed scope potentially affecting other users or site functionality.
The Patchstack advisory provides details on this WordPress plugin vulnerability, including assessment and recommendations for mitigation, accessible at https://patchstack.com/database/Wordpress/Plugin/simple-content-construction-kit/vulnerability/wordpress-simple-custom-post-type-custom-field-plugin-1-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve.
Details
- CWE(s)