CVE-2025-13071
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-11

Assigner: WPScan

Description
The Custom Admin Menu WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-11
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress custom_admin_menu 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the vulnerable WordPress plugin Custom Admin Menu (version 1.0.0 and earlier) for reflected XSS by sending crafted URL parameters that include script payloads. For example, you can use curl or a browser to access a URL like: https://example.com/wp-admin/admin.php?page=adminmenu-settings&msg=%3Csvg%2Fonload%3Dalert%28document.domain%29%3E and observe if the JavaScript alert executes. This indicates the presence of the vulnerability. Automated scanners that test for reflected XSS on this plugin's parameters can also be used. [1]


What immediate steps should I take to mitigate this vulnerability?

Since no fix is currently available for this vulnerability, immediate mitigation steps include restricting access to the affected plugin's admin pages to trusted users only, avoiding clicking on suspicious links that include crafted parameters, and monitoring for any suspicious activity. Additionally, consider disabling or removing the Custom Admin Menu plugin until a patch is released to prevent exploitation. [1]


Can you explain this vulnerability to me?

This vulnerability is a Reflected Cross-Site Scripting (XSS) issue in the Custom Admin Menu WordPress plugin up to version 1.0.0. It occurs because the plugin does not properly sanitise and escape a parameter before displaying it back on the page. This allows an attacker to inject malicious scripts that can be executed in the context of high privilege users such as administrators.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to execute malicious scripts in the browser of high privilege users like administrators. This can lead to unauthorized actions, theft of sensitive information, session hijacking, or other malicious activities performed with the privileges of the affected user.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart