Platform
wordpress
Component
sensorpress-uptime-monitoring
Opgelost in
1.0.1
CVE-2025-49409 describes a critical Stored Cross-Site Scripting (XSS) vulnerability discovered in the brewlabs SensorPress WordPress plugin. This vulnerability allows attackers to inject malicious scripts that are stored on the server and executed when other users access affected pages. The vulnerability impacts versions of SensorPress from n/a up to and including version 1.0, with a fix available in version 1.0.1.
Successful exploitation of CVE-2025-49409 allows an attacker to execute arbitrary JavaScript code in the context of a victim's browser. This can lead to a wide range of malicious activities, including session hijacking, credential theft (e.g., stealing login cookies), defacement of the website, and redirection to phishing sites. The stored nature of the XSS means that the malicious script persists on the server, potentially affecting numerous users who visit the compromised pages. The impact is particularly severe for websites with sensitive user data or critical functionality, as an attacker could gain complete control over user accounts and potentially the entire website.
CVE-2025-49409 was publicly disclosed on 2025-08-20. The vulnerability is considered high-risk due to its CRITICAL CVSS score and the ease with which it can be exploited. No public proof-of-concept (POC) code has been released at the time of writing, but the simplicity of XSS vulnerabilities suggests that a POC is likely to emerge quickly. It is not currently listed on the CISA KEV catalog.
Websites using the brewlabs SensorPress plugin, particularly those with user registration or comment functionality, are at risk. Shared hosting environments where multiple websites share the same server resources are also at increased risk, as a compromise of one website could potentially lead to the compromise of others. Sites that haven't performed regular plugin updates are especially vulnerable.
• wordpress / composer / npm:
grep -r '<script>' /var/www/html/wp-content/plugins/sensorpress/*• wordpress / composer / npm:
wp plugin list --status=active | grep sensorpress• wordpress / composer / npm:
curl -I https://yourwebsite.com/wp-content/plugins/sensorpress/ | grep -i 'x-xss-protection'disclosure
Exploit Status
EPSS
0.03% (8% percentiel)
CISA SSVC
CVSS-vector
The primary mitigation for CVE-2025-49409 is to immediately upgrade the SensorPress plugin to version 1.0.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) rule to filter out potentially malicious input. Specifically, look for patterns associated with XSS payloads, such as <script> tags, event handlers (e.g., onload, onclick), and JavaScript functions. Carefully review and sanitize all user-supplied input before displaying it on the website. After upgrading, verify the fix by attempting to inject a simple XSS payload (e.g., <script>alert('XSS')</script>) into a form field and confirming that the script is not executed.
Werk de SensorPress plugin bij naar de laatste beschikbare versie om de XSS kwetsbaarheid te mitigeren. Controleer de plugin updates direct in het WordPress beheerpaneel of via de WordPress plugin repository. Implementeer aanvullende beveiligingsmaatregelen, zoals validatie en sanitatie van gebruikersinvoer, om toekomstige XSS kwetsbaarheden te voorkomen.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2025-49409 is a critical Stored XSS vulnerability in the brewlabs SensorPress WordPress plugin, allowing attackers to inject malicious scripts.
You are affected if you are using SensorPress versions prior to 1.0.1. Check your plugin version and update immediately.
Upgrade SensorPress to version 1.0.1 or later. Consider a WAF as a temporary mitigation if upgrading is not immediately possible.
While no active exploitation has been confirmed, the vulnerability's severity and ease of exploitation suggest it is likely to be targeted.
Refer to the brewlabs SensorPress website or the WordPress plugin repository for the official advisory and update information.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.