CVE-2025-23716
Published: 03 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-23716 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Stored Cross-site Scripting (XSS) under CWE-79, in the JkmAS Login Watchdog WordPress plugin (login-watchdog). This issue affects all versions of the plugin up to and including 1.0.4.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no privileges required for the attacker, and user interaction needed for exploitation. An attacker can inject and store malicious scripts via the plugin, which execute in the browser context of other users who view affected pages, enabling potential theft of session data, defacement, or further compromise with low impacts to confidentiality, integrity, and availability across a changed scope.
Patchstack's advisory documents this Stored XSS vulnerability in the WordPress Login Watchdog plugin version 1.0.4, providing details via their vulnerability database at https://patchstack.com/database/Wordpress/Plugin/login-watchdog/vulnerability/wordpress-login-watchdog-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability is a stored XSS flaw in a public-facing WordPress plugin that allows unauthenticated injection of malicious scripts executed in other users' browsers. This directly maps to exploitation of public-facing applications.