CVE-2025-1436
Published: 13 March 2025
Description
Adversaries may abuse various implementations of JavaScript for execution.
Security Summary
CVE-2025-1436 is a cross-site request forgery (CSRF) vulnerability in the Limit Bio WordPress plugin through version 1.0, associated with CWE-352. The plugin lacks CSRF checks when updating its settings and fails to properly sanitize or escape inputs, enabling the injection of stored cross-site scripting (XSS) payloads. Published on March 13, 2025, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), reflecting network accessibility, low complexity, no privileges required, user interaction needed, and scope change with low impacts across confidentiality, integrity, and availability.
An attacker can exploit this remotely without authentication by crafting a malicious webpage that, when visited by a logged-in WordPress administrator, triggers a CSRF request to update the plugin settings. This injects a stored XSS payload, which persists and executes in the context of other users or admins viewing affected pages, potentially leading to session hijacking, data theft, or further site compromise.
The WPScan advisory at https://wpscan.com/vulnerability/849ed0a0-be17-43cf-a3a1-ad54dfb33d57/ provides details on the vulnerability, including recommended mitigations.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CVE describes a remote CSRF vulnerability in a public-facing WordPress plugin that enables injection of stored XSS payloads, directly mapping to exploitation of public-facing applications (T1190) and JavaScript execution via the XSS (T1059.007).