CVE-2025-6987
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-26

Last updated on: 2025-07-29

Assigner: Wordfence

Description
The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'advanced_iframe' shortcode in all versions up to, and including, 2025.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-26
Last Modified
2025-07-29
Generated
2026-05-06
AI Q&A
2025-07-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
advanced_iframe advanced_iframe 2025.5
advanced_iframe advanced_iframe 2025.8
advanced_iframe advanced_iframe 2025.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6987 is a stored Cross-Site Scripting (XSS) vulnerability in the Advanced iFrame WordPress plugin versions up to 2025.5. It allows authenticated users with Contributor-level access or higher to inject malicious scripts via the plugin's 'advanced_iframe' shortcode due to insufficient input sanitization and output escaping of user-supplied attributes. These injected scripts are stored and executed whenever any user accesses the affected page, potentially compromising site security. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can allow authenticated users with Contributor or higher privileges to inject arbitrary malicious scripts into pages using the Advanced iFrame plugin. When other users visit these pages, the malicious scripts execute in their browsers, potentially leading to unauthorized actions such as stealing session cookies, defacing content, or performing actions on behalf of users. This compromises the security and integrity of the affected WordPress site. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The provided resources do not include specific commands or detailed detection methods for identifying the CVE-2025-6987 vulnerability on a network or system. However, the plugin update includes enhanced debugging features such as a debug console that logs local and remote messages, including JavaScript console logs, warnings, and errors, which can aid in troubleshooting and potentially detecting exploitation attempts. To detect this vulnerability, monitoring for unusual stored scripts in pages using the 'advanced_iframe' shortcode and reviewing logs for suspicious iframe content or JavaScript execution may help. No explicit commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate CVE-2025-6987, immediately update the Advanced iFrame WordPress plugin to version 2025.6 or later, where the vulnerability is fixed. The update includes proper sanitization and validation of shortcode attributes and iframe parameters to prevent stored Cross-Site Scripting (XSS) attacks. Additionally, review user roles and restrict Contributor-level or higher access to trusted users only, as exploitation requires authenticated users with at least Contributor privileges. Monitoring and applying the plugin's security patches promptly is critical to prevent exploitation. [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart