CVE-2025-53325
BaseFortify
Publication date: 2025-06-27
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Beauty Contact Popup Form WordPress plugin (up to version 6.0). It allows an attacker with administrator privileges to inject malicious scripts into the website, which then execute when visitors access the site. These scripts can perform actions like redirects, displaying unwanted advertisements, or other harmful HTML payloads. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to malicious scripts running on your website, potentially redirecting visitors to harmful sites, displaying unwanted content, or stealing user information. Although the risk is considered low and exploitation unlikely, automated attacks may target unpatched sites. It can harm your site's reputation and compromise visitor security. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves checking for malicious script injections in the Beauty Contact Popup Form plugin, especially in stored inputs. Since plugin-based malware scanners may be unreliable, manual inspection of the plugin's input fields and stored data is recommended. Network detection could involve monitoring for unusual script execution or redirects originating from the affected plugin. Specific commands are not provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying virtual patching (vPatching) offered by Patchstack, which auto-mitigates the vulnerability without performance loss. Since no official patch is available, users should consider professional incident response or seek assistance from their hosting provider if compromised. Monitoring and restricting administrator privileges to trusted users can also reduce risk. [1]