Cyber Posture

CVE-2025-22628

High

Published: 27 March 2025

Published
27 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0010 27.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-22628 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Stored Cross-site Scripting (XSS) under CWE-79, in the FolioVision Filled In WordPress plugin. The issue affects all versions of the plugin from unspecified initial releases through 1.9.2. Published on March 27, 2025, it carries a CVSS v3.1 base score of 7.1 (High), reflecting network accessibility, low attack complexity, no required privileges, user interaction dependency, changed scope, and low impacts on confidentiality, integrity, and availability.

An unauthenticated attacker (PR:N) can exploit this over the network (AV:N) by leveraging a CSRF-to-Stored XSS vector, as detailed in the reference advisory. This requires tricking a user into performing an action (UI:R), such as submitting malicious input via a crafted request, which gets stored and executed in the context of the site for subsequent viewers (S:C). Successful exploitation enables script injection, potentially allowing theft of session data, site defacement, or further compromise for affected users.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/filled-in/vulnerability/wordpress-filled-in-plugin-1-9-1-csrf-to-stored-xss-vulnerability?_s_id=cve documents the CSRF-to-Stored XSS vulnerability specifically in Filled In plugin versions up to 1.9.1 and recommends mitigation through updating to a patched version beyond 1.9.2.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly enables T1190 (exploit public-facing app) and facilitates T1059.007 (arbitrary JavaScript execution for session theft/defacement).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References