CVE-2025-14125
Reflected XSS in Complag WordPress Plugin Allows Script Injection
Publication date: 2025-12-12
Last updated on: 2025-12-12
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | complag_plugin | 1.0.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Complag plugin for WordPress to a version later than 1.0.2 where the issue is fixed. Until then, restrict access to the plugin or disable it to prevent exploitation. Additionally, educate users to avoid clicking on suspicious links that could trigger the reflected XSS attack.
Can you explain this vulnerability to me?
This vulnerability is a Reflected Cross-Site Scripting (XSS) issue in the Complag plugin for WordPress, affecting all versions up to 1.0.2. It occurs because the plugin does not properly sanitize or escape the $_SERVER['PHP_SELF'] variable, allowing unauthenticated attackers to inject malicious scripts into web pages. These scripts execute when a user is tricked into performing an action like clicking a crafted link.
How can this vulnerability impact me? :
The vulnerability can allow attackers to execute arbitrary scripts in the context of the affected website, potentially leading to theft of user data, session hijacking, or other malicious actions. Since it requires user interaction (such as clicking a link), it can be used to compromise users who visit the site, impacting the security and trustworthiness of the website.