CVE-2025-13513
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | clik_stats | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Clik stats plugin for WordPress has a Reflected Cross-Site Scripting (XSS) vulnerability in versions up to and including 0.8. This occurs because the plugin does not properly sanitize or escape the $_SERVER['PHP_SELF'] parameter, allowing attackers to inject malicious scripts. These scripts can execute in the context of a user's browser if the user is tricked into clicking a crafted link.
How can this vulnerability impact me? :
This vulnerability can allow unauthenticated attackers to execute arbitrary scripts in the browsers of users who visit affected pages and perform actions like clicking on malicious links. This can lead to theft of sensitive information, session hijacking, or other malicious activities performed on behalf of the user.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the Clik Stats WordPress plugin to a version later than 0.8 where the reflected cross-site scripting issue via the $_SERVER['PHP_SELF'] parameter is fixed. If an update is not available, consider disabling or removing the plugin until a patch is released. Additionally, ensure that your WordPress installation and plugins are kept up to date to prevent exploitation of known vulnerabilities.