Cyber Posture

CVE-2025-23735

High

Published: 26 March 2025

Published
26 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0022 45.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-23735 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Infugrator WordPress plugin developed by Cosmin Schiopu. This issue affects Infugrator versions from n/a through 1.0.3 inclusive. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges, user interaction requirement, and scope change.

An unauthenticated remote attacker can exploit this vulnerability by crafting malicious input that is reflected back in a web page generated by the plugin. The attacker typically tricks a victim user—such as a site administrator or authenticated visitor—into interacting with the malicious payload, for example by clicking a phishing link or visiting a tainted URL. Upon successful exploitation, the attacker can execute arbitrary JavaScript in the victim's browser context, achieving low impacts on confidentiality (e.g., limited data exposure), integrity (e.g., minor tampering), and availability (e.g., minor denial of service).

The primary advisory reference is from Patchstack at https://patchstack.com/database/Wordpress/Plugin/infugrator/vulnerability/wordpress-infugrator-plugin-1-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve, which documents the vulnerability in the WordPress Infugrator plugin version 1.0.3.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Reflected XSS in public-facing WordPress plugin enables remote exploitation of the web application (T1190) to execute arbitrary JavaScript in the victim's browser (T1059.007) via crafted malicious links.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References