• Cybersecurity Vulnerabilities

    BuddyPress Restrictions Plugin Under Fire: CVE-2025-12391 Allows Unauthenticated Tracking Manipulation

    Overview CVE-2025-12391 is a medium severity vulnerability affecting the Restrictions for BuddyPress plugin for WordPress. This flaw allows unauthenticated attackers to manipulate user tracking preferences, specifically opting users in or out of tracking, without proper authorization. The vulnerability stems from a missing capability check on the handle_optin_optout() function. This issue impacts all versions of the plugin up to and including version 1.5.2. Technical Details The vulnerability resides in the handle_optin_optout() function within the Restrictions for BuddyPress plugin. Due to the absence of a capability check, the function can be accessed and executed by unauthenticated users. Attackers can exploit this by…

  • Cybersecurity Vulnerabilities

    Urgent: Stored XSS Vulnerability Discovered in Meta Display Block WordPress Plugin (CVE-2025-12088)

    Overview A stored Cross-Site Scripting (XSS) vulnerability has been identified in the Meta Display Block plugin for WordPress. This vulnerability, tracked as CVE-2025-12088, affects all versions up to and including 1.0.0. It allows authenticated attackers with Contributor-level access or higher to inject malicious JavaScript code into pages, potentially compromising the security of your website and its users. This injected code will execute whenever a user views the affected page. Technical Details The Meta Display Block plugin suffers from insufficient input sanitization and output escaping when handling data related to the Meta Display Block. This allows an attacker to inject arbitrary…

  • Cybersecurity Vulnerabilities

    WP Twitter Auto Publish Plugin Vulnerable to XSS: CVE-2025-12079

    Overview CVE-2025-12079 details a Reflected Cross-Site Scripting (XSS) vulnerability found in the WP Twitter Auto Publish plugin for WordPress. This vulnerability affects all versions of the plugin up to and including 1.7.3. Due to insufficient input sanitization and output escaping when handling PostMessage data, unauthenticated attackers can inject arbitrary web scripts into pages. Exploitation requires tricking a user into clicking a malicious link. Technical Details The vulnerability lies in how the WP Twitter Auto Publish plugin handles data received via the PostMessage API. The plugin fails to properly sanitize and escape this data before rendering it in the user’s browser.…

  • Cybersecurity Vulnerabilities

    CVE-2025-11734: Broken Link Checker Plugin Exposes WordPress Sites to Unauthorized Post Deletion!

    Overview CVE-2025-11734 is a medium-severity vulnerability affecting the “Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links” plugin for WordPress, specifically versions up to and including 1.2.5. This vulnerability allows authenticated attackers with contributor-level access or higher to trash arbitrary posts without proper authorization checks. By exploiting this flaw, a malicious contributor can effectively delete any post on the WordPress site, regardless of their intended privileges. Technical Details The root cause of this vulnerability lies in the plugin’s implementation of a REST API endpoint. The /wp-json/aioseoBrokenLinkChecker/v1/post endpoint, intended for managing post-related broken link checks, is insufficiently protected.…

  • Cybersecurity Vulnerabilities

    CVE-2025-9625: Unveiling a CSRF Vulnerability in the Coil Web Monetization WordPress Plugin

    Overview CVE-2025-9625 identifies a Cross-Site Request Forgery (CSRF) vulnerability affecting the Coil Web Monetization plugin for WordPress. This vulnerability exists in versions up to and including 2.0.2. It allows unauthenticated attackers to potentially trigger CSS selector detection functionality by crafting a malicious request and tricking an administrator into executing it. This could lead to unauthorized actions performed on the website on behalf of the administrator. Technical Details The vulnerability stems from the insufficient or absent nonce validation for the `coil-get-css-selector` parameter within the `maybe_restrict_content` function of the Coil plugin. This means that an attacker can construct a malicious HTTP request…

  • Cybersecurity Vulnerabilities

    Critical Security Alert: Stored XSS Vulnerability Discovered in RTMKit Addons for Elementor (CVE-2025-8609)

    Overview A significant security vulnerability, identified as CVE-2025-8609, has been discovered in the RTMKit Addons for Elementor plugin for WordPress. This flaw is a Stored Cross-Site Scripting (XSS) vulnerability that could allow attackers to inject malicious scripts into your website. This vulnerability affects all versions up to and including 1.6.1 of the RTMKit Addons for Elementor plugin. Technical Details The vulnerability resides within the Accordion Block of the plugin. Specifically, the issue stems from insufficient input sanitization and output escaping on user-supplied attributes within the Accordion block’s settings. This means that an authenticated attacker with contributor-level access or higher can…

  • Cybersecurity Vulnerabilities

    Gutenify WordPress Plugin: Stored XSS Vulnerability (CVE-2025-8605) Puts Your Site at Risk!

    Overview This article details a Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2025-8605, affecting the Gutenify – Visual Site Builder Blocks & Site Templates plugin for WordPress. This vulnerability allows authenticated attackers with contributor-level access or higher to inject malicious JavaScript code into website pages. This code executes whenever a user views the affected page, potentially leading to account compromise, data theft, and website defacement. Technical Details CVE-2025-8605 stems from insufficient input sanitization and output escaping within the Gutenify plugin’s block attributes. Specifically, user-supplied attributes are not properly validated or encoded before being stored in the WordPress database and subsequently…

  • Cybersecurity Vulnerabilities

    Critical Path Restriction Bypass Vulnerability Discovered in Serv-U (CVE-2025-40549)

    Overview A critical vulnerability, identified as CVE-2025-40549, has been discovered in Serv-U, a widely used managed file transfer server. This vulnerability allows a malicious actor with existing administrative privileges to bypass path restrictions and potentially execute arbitrary code within a directory. While requiring admin access mitigates the overall risk, the potential for severe impact warrants immediate attention and patching. Technical Details CVE-2025-40549 is a path restriction bypass vulnerability. Exploitation requires the attacker to already possess administrative privileges within the Serv-U environment. Once authenticated with administrative rights, the attacker can manipulate path configurations to circumvent intended restrictions. This allows the actor…

  • Cybersecurity Vulnerabilities

    CVE-2025-40548: Critical Code Execution Vulnerability Threatens Serv-U Servers

    Overview CVE-2025-40548 is a critical vulnerability affecting Serv-U file transfer protocol servers. This flaw stems from a missing validation process that, when exploited by a malicious actor with administrative privileges, can lead to arbitrary code execution on the affected system. While administrative access is required, the potential impact of this vulnerability is severe, particularly on Windows deployments where Serv-U services often run under less-privileged service accounts. Technical Details The vulnerability lies in the lack of proper input validation within a specific functionality of Serv-U. An attacker with administrative credentials can leverage this missing validation to inject malicious code, which the…

  • Cybersecurity Vulnerabilities

    Critical Alert: Code Execution Vulnerability Patched in Serv-U (CVE-2025-40547)

    Overview A critical vulnerability, identified as CVE-2025-40547, has been discovered and patched in SolarWinds Serv-U. This logic error, if exploited by a malicious actor with administrative privileges, could lead to arbitrary code execution on the affected system. Due to the high potential impact, it’s crucial to understand the details of this vulnerability and apply the necessary mitigations. Technical Details CVE-2025-40547 is a logic error vulnerability within the Serv-U application. While specific details regarding the vulnerable code are not publicly available, the advisory indicates that a malicious actor who already possesses administrative credentials on the Serv-U instance can leverage this flaw…