CVE-2025-12396
BaseFortify
Publication date: 2025-11-04
Last updated on: 2025-11-04
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | clubmember_plugin | 0.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the clubmember plugin for WordPress versions up to 0.2. It occurs because the plugin does not properly sanitize input or escape output in admin settings. As a result, authenticated users with administrator-level permissions or higher can inject malicious scripts that execute whenever a user visits the affected page. This vulnerability only affects multi-site WordPress installations or those where the unfiltered_html setting is disabled.
How can this vulnerability impact me? :
An attacker with administrator-level access can exploit this vulnerability to inject malicious scripts into the website. These scripts can execute in the context of users visiting the injected pages, potentially leading to theft of sensitive information, session hijacking, or other malicious actions. The impact is limited to multi-site installations or those with unfiltered_html disabled, but it can compromise the integrity and security of the affected WordPress sites.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the clubmember plugin to a version later than 0.2 where the issue is fixed. Additionally, ensure that only trusted administrators have access to the plugin settings, and consider enabling unfiltered_html if appropriate. For multi-site installations, review and restrict administrator permissions carefully to prevent exploitation.