Cyber Posture

CVE-2025-2009

High

Published: 26 March 2025

Published
26 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0090 75.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-2009 is a stored cross-site scripting (XSS) vulnerability in the Newsletters plugin for WordPress, affecting all versions up to and including 4.9.9.7. The flaw arises in the logging functionality due to insufficient input sanitization and output escaping, allowing arbitrary web scripts to be injected into pages. It is classified under CWE-79 with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and changed scope.

Unauthenticated attackers can exploit this vulnerability remotely by injecting malicious scripts through the logging mechanism. Once injected, the scripts persist in pages and execute in the context of any user who accesses those pages, potentially leading to session hijacking, data theft, or further site compromise depending on the victim's privileges.

References include Wordfence's threat intelligence advisory detailing the issue, along with WordPress plugin trac links to the vulnerable code in views/admin/settings/view_logs.php at line 107 and a subsequent changeset 3257980, which indicates a patch addressing the sanitization and escaping deficiencies. Security practitioners should update the plugin beyond version 4.9.9.7 to mitigate the risk.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly enables T1190 (Exploit Public-Facing Application) via remote unauthenticated injection; malicious web scripts (JavaScript) facilitate T1059.007 (JavaScript) for execution leading to session hijacking or data theft.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References