CVE-2025-5303 Overview
CVE-2025-5303 is a Stored Cross-Site Scripting (XSS) vulnerability affecting three related WordPress plugins: LTL Freight Quotes – Freightview Edition, LTL Freight Quotes – Daylight Edition, and LTL Freight Quotes – Day & Ross Edition. The flaw exists in the handling of the expiry_date parameter, where insufficient input sanitization and output escaping allow unauthenticated attackers to inject arbitrary JavaScript. Injected scripts execute in the browser of any user who accesses an affected page. The vulnerability is tracked as CWE-79 and is documented in the Wordfence Vulnerability Report.
Critical Impact
Unauthenticated attackers can inject persistent JavaScript that executes for site visitors and administrators, enabling session theft, content defacement, and admin account takeover.
Affected Products
- LTL Freight Quotes – Freightview Edition (versions up to and including 1.0.11)
- LTL Freight Quotes – Daylight Edition (versions up to and including 2.2.6)
- LTL Freight Quotes – Day & Ross Edition (versions up to and including 2.1.10)
Discovery Timeline
- 2025-06-07 - CVE-2025-5303 published to NVD
- 2026-04-15 - Last updated in NVD database
Technical Details for CVE-2025-5303
Vulnerability Analysis
The vulnerability is a Stored Cross-Site Scripting flaw classified under CWE-79. The affected plugins accept the expiry_date parameter and persist the value to the database without proper sanitization. When the stored value is later rendered, the plugins fail to escape output before sending it to the browser. The combination of missing input filtering and missing output escaping enables attackers to plant script payloads that execute every time a victim loads the affected page. The EPSS score is 0.98% at the 76.875 percentile, indicating moderate predicted exploitation likelihood.
Root Cause
The root cause lies in the plugin code paths that process the expiry_date input field. According to the WordPress Plugin Code Review for en-hit-to-update-plan.php at line 29 and common/en-plans.php at line 110, the parameter is read directly from the request and written to storage without calling WordPress sanitization helpers such as sanitize_text_field(). On output, the value is echoed without esc_html() or esc_attr() wrappers.
Attack Vector
The attack is exploitable over the network and requires no authentication or user interaction beyond loading the affected page. An attacker sends a crafted request containing a JavaScript payload in the expiry_date parameter to the vulnerable endpoint. The payload is stored persistently in the WordPress database. When a site administrator or visitor accesses a page that renders the stored value, the script executes in their browser context with full access to cookies, session tokens, and the WordPress administrative interface if the victim is logged in.
No verified proof-of-concept code is publicly available. See the Wordfence Vulnerability Report for additional technical context.
Detection Methods for CVE-2025-5303
Indicators of Compromise
- Database entries in plugin tables containing <script>, onerror=, onload=, or javascript: strings within the expiry_date field
- Unexpected outbound requests from administrator browsers to attacker-controlled domains shortly after visiting plugin-rendered pages
- New or modified WordPress administrator accounts created without authorized change records
- HTTP POST requests to plugin endpoints containing URL-encoded script payloads in the expiry_date parameter
Detection Strategies
- Inspect WordPress database tables used by the three LTL Freight Quotes plugins for HTML or script content in expiry_date values
- Review web server access logs for requests to en-hit-to-update-plan.php and en-plans.php containing suspicious parameter content
- Deploy web application firewall rules that flag XSS signatures in form submissions targeting the affected plugin paths
Monitoring Recommendations
- Enable WordPress audit logging to track plugin configuration changes and user role modifications
- Monitor for anomalous administrator session behavior, including unexpected REST API calls or content modifications
- Aggregate web traffic logs into a SIEM and alert on injection patterns matching CWE-79 signatures across plugin endpoints
How to Mitigate CVE-2025-5303
Immediate Actions Required
- Update all three affected plugins to versions newer than 1.0.11 (Freightview), 2.2.6 (Daylight), and 2.1.10 (Day & Ross) once a patched release is published
- Audit the WordPress database for previously injected payloads in plugin storage and remove malicious entries
- Rotate WordPress administrator passwords and invalidate active sessions if compromise is suspected
- Restrict access to plugin administrative endpoints using HTTP authentication or IP allow-listing until patched
Patch Information
At the time of NVD publication, the vendor advisory references the vulnerable code in versions 1.0.11, 2.2.6, and 2.1.10. Site operators should consult the Wordfence Vulnerability Report and the WordPress plugin repository for the latest fixed releases and apply updates immediately.
Workarounds
- Deactivate and remove the affected LTL Freight Quotes plugins until a fixed version is installed
- Deploy a web application firewall with XSS payload signatures applied to requests targeting en-hit-to-update-plan.php and en-plans.php
- Apply a strict Content Security Policy that blocks inline scripts and restricts script sources to trusted origins
# Example Content Security Policy header to mitigate stored XSS
Header set Content-Security-Policy "default-src 'self'; script-src 'self'; object-src 'none'; base-uri 'self'; frame-ancestors 'self'"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


