Cyber Posture

CVE-2025-1436

HighPublic PoC

Published: 13 March 2025

Published
13 March 2025
Modified
06 October 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0007 21.3th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-1436 is a cross-site request forgery (CSRF) vulnerability in the Limit Bio WordPress plugin through version 1.0, associated with CWE-352. The plugin lacks CSRF checks when updating its settings and fails to properly sanitize or escape inputs, enabling the injection of stored cross-site scripting (XSS) payloads. Published on March 13, 2025, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), reflecting network accessibility, low complexity, no privileges required, user interaction needed, and scope change with low impacts across confidentiality, integrity, and availability.

An attacker can exploit this remotely without authentication by crafting a malicious webpage that, when visited by a logged-in WordPress administrator, triggers a CSRF request to update the plugin settings. This injects a stored XSS payload, which persists and executes in the context of other users or admins viewing affected pages, potentially leading to session hijacking, data theft, or further site compromise.

The WPScan advisory at https://wpscan.com/vulnerability/849ed0a0-be17-43cf-a3a1-ad54dfb33d57/ provides details on the vulnerability, including recommended mitigations.

Details

CWE(s)
CWE-352

Affected Products

rivercitygraphix
limit bio
1.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

The CVE describes a remote CSRF vulnerability in a public-facing WordPress plugin that enables injection of stored XSS payloads, directly mapping to exploitation of public-facing applications (T1190) and JavaScript execution via the XSS (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References