CVE-2025-23727
Published: 23 January 2025
Description
Adversaries may abuse various implementations of JavaScript for execution.
Security Summary
CVE-2025-23727 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the AZ Content Finder WordPress plugin developed by antonzaroutski. This issue affects the plugin in all versions from n/a through 0.1 inclusive. Published on 2025-01-23, it carries a CVSS v3.1 base score of 7.1.
The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) but user interaction (UI:R), and results in a changed scope (S:C) with low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L). Any unauthenticated attacker can craft malicious payloads that reflect off the vulnerable plugin when a user visits a manipulated URL, enabling script execution in the victim's browser context.
The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/az-content-finder/vulnerability/wordpress-az-content-finder-plugin-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) documents the Reflected XSS vulnerability in AZ Content Finder version 0.1 for WordPress, providing details for security practitioners to assess and address exposure in affected environments.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Reflected XSS enables arbitrary JavaScript execution in the victim's browser when visiting a crafted malicious URL, directly mapping to User Execution (Malicious Link) and JavaScript scripting.