Cyber Posture

CVE-2025-22766

High

Published: 15 January 2025

Published
15 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0021 42.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Masoud Amini Zarinpal Paid Download zarinpal-paid-downloads allows Reflected XSS.This issue affects Zarinpal Paid Download: from n/a through <= 2.3.

Security Summary

CVE-2025-22766 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-Site Scripting (XSS) under CWE-79, affecting the WordPress plugin Zarinpal Paid Download (zarinpal-paid-downloads) developed by Masoud Amini. The issue impacts all versions from n/a through 2.3 inclusive. Published on 2025-01-15, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility, low complexity, no privileges required, user interaction needed, and scope change with low impacts on confidentiality, integrity, and availability.

Attackers can exploit this vulnerability remotely over the network without authentication by crafting malicious payloads that reflect user input on the web page. Exploitation requires tricking an authenticated user, such as a site administrator or logged-in visitor, into interacting with a malicious link or input (e.g., via phishing or social engineering). Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser context, potentially leading to session hijacking, theft of sensitive data like cookies or tokens, or minor disruptions, though impacts remain low per the CVSS metrics.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/zarinpal-paid-downloads/vulnerability/wordpress-zarinpal-paid-download-plugin-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve documents this WordPress plugin vulnerability and serves as a primary reference for affected versions up to 2.3. Security practitioners should verify plugin updates beyond version 2.3 for patches, apply input sanitization where feasible, and monitor sites running this plugin.

Details

CWE(s)
CWE-79

References