CVE-2025-5753

MEDIUM
2025-07-23 [email protected]
6.4
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 19:39 vuln.today
CVE Published
Jul 23, 2025 - 03:15 nvd
MEDIUM 6.4

DescriptionNVD

The Valuation Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AnalysisAI

Stored Cross-Site Scripting in the Valuation Calculator WordPress plugin (all versions up to 1.3.2) allows authenticated attackers with Contributor-level access or higher to inject arbitrary JavaScript through the 'link' parameter due to insufficient input sanitization and output escaping. Injected scripts execute in the context of any user viewing the affected page, potentially compromising site visitors and enabling session hijacking, credential theft, or malware distribution. No public exploit code or active exploitation has been confirmed at time of analysis.

Technical ContextAI

The vulnerability is rooted in CWE-79 (Improper Neutralization of Input During Web Page Generation), a stored XSS flaw in the commercial-real-estate-valuation-calculator WordPress plugin. The plugin fails to sanitize user input from the 'link' parameter before storing it in the database and fails to properly escape output when rendering the parameter in page content. This allows attackers to bypass WordPress's input validation mechanisms. WordPress authentication (Contributor role or above) is enforced by the plugin architecture, but the vulnerability itself exists in the plugin's custom request handling rather than WordPress core. The Wordfence source indicates the flaw is in the valuation-calculator.php file around line 386, where the link parameter is processed without adequate sanitization routines such as sanitize_url() or proper escaping via esc_url_raw() on input, and esc_attr() or esc_url() on output.

Affected ProductsAI

The Valuation Calculator plugin for WordPress, formally titled commercial-real-estate-valuation-calculator (CPE inferred: cpe:2a:wordpress:*:commercial-real-estate-valuation-calculator), is affected in all versions up to and including 1.3.2. The plugin is distributed through the official WordPress Plugin Directory at https://wordpress.org/plugins/commercial-real-estate-valuation-calculator/. The vulnerable code is tracked in the WordPress plugins repository at https://plugins.trac.wordpress.org/browser/commercial-real-estate-valuation-calculator/trunk/valuation-calculator.php#L386. Wordfence has assigned the vulnerability identifier eb14f2ed-6ae8-409e-86fc-c305a56f5d5b and provides additional details at https://www.wordfence.com/threat-intel/vulnerabilities/id/eb14f2ed-6ae8-409e-86fc-c305a56f5d5b.

RemediationAI

Site administrators should immediately update the Valuation Calculator plugin to the latest available version, which has addressed the sanitization and escaping deficiencies. As of the changeset referenced (https://plugins.trac.wordpress.org/changeset/3336105/), a patched version has been released in the official WordPress Plugin Directory. Users unable to update immediately should restrict Contributor-level access to trusted administrators only, audit existing pages for injected content, and monitor user access logs for unauthorized modifications. For detailed patching information and developer notes, consult https://wordpress.org/plugins/commercial-real-estate-valuation-calculator/#developers and the Wordfence vulnerability advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/eb14f2ed-6ae8-409e-86fc-c305a56f5d5b.

Share

CVE-2025-5753 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy