Cyber Posture

CVE-2025-22286

High

Published: 16 February 2025

Published
16 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0009 25.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in enituretechnology LTL Freight Quotes – Worldwide Express Edition ltl-freight-quotes-worldwide-express-edition allows Reflected XSS.This issue affects LTL Freight Quotes – Worldwide Express Edition: from n/a through <= 5.0.21.

Security Summary

CVE-2025-22286 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the WordPress plugin LTL Freight Quotes – Worldwide Express Edition by enituretechnology. The issue affects all versions of the plugin from n/a through 5.0.21 inclusive. Published on 2025-02-16, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility and changed scope.

Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity by tricking users into interacting with malicious input, such as clicking a crafted link or submitting tainted data that reflects back in the web page. Exploitation enables injection of arbitrary scripts into the victim's browser context, potentially leading to low-level impacts on confidentiality (e.g., session token theft), integrity (e.g., script execution), and availability, with the changed scope amplifying risks like account takeover in the context of the site.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/ltl-freight-quotes-worldwide-express-edition/vulnerability/wordpress-ltl-freight-quotes-worldwide-express-edition-plugin-5-0-21-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve details the Reflected XSS flaw in plugin version 5.0.21 and provides guidance on mitigation, including recommendations for applying available patches or updates to vulnerable installations.

Details

CWE(s)
CWE-79

References