CVE-2025-58674
BaseFortify
Publication date: 2025-09-23
Last updated on: 2026-04-28
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | wordpress | 6.8 |
| wordpress | wordpress | 5.5 |
| wordpress | wordpress | 5.8 |
| wordpress | wordpress | 6.8.3 |
| wordpress | wordpress | 6.3 |
| wordpress | wordpress | 6.4 |
| wordpress | wordpress | 5.1 |
| wordpress | wordpress | 6.0 |
| wordpress | wordpress | 5.9 |
| wordpress | wordpress | 4.7 |
| wordpress | wordpress | 6.1 |
| wordpress | wordpress | 5.6 |
| wordpress | wordpress | 5.4 |
| wordpress | wordpress | 6.2 |
| wordpress | wordpress | 6.8.2 |
| wordpress | wordpress | 6.6 |
| wordpress | wordpress | 6.7 |
| wordpress | wordpress | 4.8 |
| wordpress | wordpress | 5.2 |
| wordpress | wordpress | 5.3 |
| wordpress | wordpress | 5.0 |
| wordpress | wordpress | 4.9 |
| wordpress | wordpress | 6.5 |
| wordpress | wordpress | 5.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-site Scripting (XSS) issue in Automattic WordPress. It occurs due to improper neutralization of input during web page generation, allowing an attacker with Author or higher user privileges to inject malicious scripts that are stored and executed in the context of other users viewing the affected pages.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with Author or higher privileges to execute malicious scripts in the context of other users, potentially leading to data theft, session hijacking, or other malicious actions. Although it is considered low severity, it can compromise the integrity and confidentiality of user data and site functionality.
What immediate steps should I take to mitigate this vulnerability?
Since this vulnerability requires an attacker to have Author or higher user privileges, immediate mitigation steps include limiting user privileges to only those necessary, monitoring and restricting Author-level access, and applying any forthcoming patches from the WordPress core security team once available. Additionally, implementing web application firewalls and input validation can help reduce risk.