Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-49890 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Stored XSS in 'AWStats Script' plugin. πŸ“‰ **Consequences**: Malicious scripts persist on the site, hijacking user sessions, stealing cookies, or defacing pages. Critical integrity loss.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-502**: Deserialization of Untrusted Data (Note: Description cites XSS, but CWE is listed as 502).…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Vendor**: ThemeREX. πŸ“¦ **Product**: Organic Beauty Theme & AWStats Script Plugin. πŸ“… **Version**: AWStats Script **0.3 and earlier**. WordPress core is also mentioned as part of the ecosystem.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Actions**: Execute arbitrary JavaScript in victims' browsers. πŸ•΅οΈ **Impact**: Steal sensitive data (cookies/tokens), perform actions on behalf of users, or redirect traffic. Full UI compromise.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: LOW. 🚫 **Auth**: None required (PR:N). πŸ–±οΈ **UI**: None required (UI:N). 🌐 **Network**: Remote (AV:N). Easy to exploit for any unauthenticated user.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp**: No specific PoC provided in data. πŸ” **Status**: Listed in Patchstack DB. Wild exploitation likely possible due to low complexity and no auth requirement.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for 'AWStats Script' plugin version 0.3 or lower. πŸ§ͺ **Test**: Look for stored XSS vectors in stats input fields. Use DAST tools to detect reflected/stored script injection points.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update 'AWStats Script' plugin to version **>0.3**. πŸ”„ **Mitigation**: Remove the plugin if not needed. Check Patchstack for official patch notes.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable the plugin immediately. πŸ›‘οΈ **Defense**: Implement strict Input Validation/Output Encoding (WAF rules) to block script tags in user inputs. Monitor for suspicious script executions.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: CRITICAL. 🚨 **CVSS**: 9.8 (High). ⚑ **Urgency**: Patch immediately. Remote, unauthenticated, high impact. Do not delay.