CVE-2025-12186
BaseFortify
Publication date: 2025-12-05
Last updated on: 2025-12-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| michael_j_reid | weekly_planner | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Weekly Planner plugin for WordPress. It occurs because the plugin does not properly sanitize or escape input in its admin settings, allowing authenticated users with administrator-level permissions or higher to inject malicious scripts. These scripts execute whenever a user accesses the affected page. The vulnerability affects multi-site installations and installations where the unfiltered_html setting is disabled.
How can this vulnerability impact me? :
An attacker with administrator-level permissions can inject malicious scripts that execute in the context of users visiting the affected pages. This can lead to unauthorized actions, data theft, session hijacking, or other malicious activities within the WordPress site, potentially compromising site integrity and user security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Weekly Planner plugin for WordPress to a version later than 1.0 once available. In the meantime, restrict administrator-level permissions to trusted users only, ensure that unfiltered_html is enabled if possible, and avoid using multi-site installations with this plugin until a fix is applied.