CVE-2025-23736
Published: 03 March 2025
Description
Adversaries may abuse various implementations of JavaScript for execution.
Security Summary
CVE-2025-23736 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the webgdawg Form To JSON WordPress plugin (form-to-json). This issue affects all versions from n/a through 1.0 inclusive. Published on 2025-03-03, it carries a CVSS v3.1 base score of 7.1.
Attackers can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) but user interaction (UI:R), such as clicking a malicious link. The changed scope (S:C) enables script execution in the victim's browser context, resulting in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L). Potential outcomes include session hijacking, data theft, or further site compromise within the user's session.
The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/form-to-json/vulnerability/wordpress-form-to-json-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) documents this Reflected XSS vulnerability in the Form To JSON WordPress plugin version 1.0.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Reflected XSS enables arbitrary JavaScript execution in the victim's browser when a user clicks a crafted malicious link containing the payload, directly facilitating user execution via malicious link and JavaScript scripting.