Cyber Posture

CVE-2025-23499

High

Published: 16 January 2025

Published
16 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0014 33.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier Board Election board-election allows Stored XSS.This issue affects Board Election: from n/a through <= 1.0.1.

Security Summary

CVE-2025-23499 is a Cross-Site Request Forgery (CSRF) vulnerability in the Board Election WordPress plugin by Pascal Casier that allows Stored XSS. This issue affects the plugin from unknown initial versions through version 1.0.1 inclusive. The vulnerability is associated with CWE-352 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and changed scope with low impacts on confidentiality, integrity, and availability.

Attackers can exploit this vulnerability without authentication privileges over the network by tricking authenticated users into performing unintended actions via a forged request, leading to the storage of malicious XSS payloads. Once stored, the XSS executes in the context of other users viewing affected pages, potentially enabling theft of session data, site defacement, or further compromise within the changed scope of the Cross-Origin Resource Sharing.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/board-election/vulnerability/wordpress-board-election-plugin-1-0-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve documents the CSRF-to-Stored XSS vulnerability specifically in Board Election plugin version 1.0.1 and provides details on the issue for mitigation guidance.

Details

CWE(s)
CWE-352

References