CVE-2025-0924
WordPress vulnerability analysis and mitigation

Overview

The WP Activity Log plugin for WordPress contains a Stored Cross-Site Scripting vulnerability (CVE-2025-0924) that affects all versions up to and including 5.2.2. The vulnerability was discovered by researcher Andres Roldan and was publicly disclosed in February 2025 (Wordfence Threat, Red Hat CVE).

Technical details

The vulnerability exists in the 'message' parameter of the WP Activity Log plugin, allowing for stored cross-site scripting attacks. The severity of this vulnerability has been rated with a CVSS score of 7.2, indicating a high-severity issue (Wordfence Threat).

Impact

A successful exploitation of this vulnerability could allow attackers to inject malicious scripts that would be stored on the target site and executed in users' browsers when the affected pages are viewed. This could lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the affected users.

Mitigation and workarounds

The vulnerability has been addressed in version 5.3.3 of the WP Activity Log plugin, released on March 4, 2025. Users are strongly advised to update to this latest version which includes security fixes for the insecure deserialization issue (WordPress Plugin).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management