Cyber Posture

CVE-2025-23744

High

Published: 15 March 2025

Published
15 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0008 23.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-23744 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the WordPress plugin Random Posts, Mp3 Player + ShareButton by dvs11. This issue affects all versions of the plugin from unknown initial release through 1.4.1. The vulnerability was published on 2025-03-15 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and scope change.

Attackers can exploit this Reflected XSS remotely over the network with low attack complexity and no privileges required, though successful exploitation depends on user interaction, such as a victim clicking a malicious link or interacting with crafted input that gets reflected unsanitized into the web page. This allows limited impacts on confidentiality, integrity, and availability within a changed security scope, potentially enabling theft of user session data, defacement, or further phishing within the site's context.

Patchstack advisories detail the Reflected XSS vulnerability specifically in the random-posts-mp3-player-sharebutton WordPress plugin up to version 1.4.1, providing analysis for mitigation guidance. Security practitioners should consult the referenced advisory at https://patchstack.com/database/Wordpress/Plugin/random-posts-mp3-player-sharebutton/vulnerability/wordpress-random-posts-mp3-player-sharebutton-plugin-1-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve for recommended actions, such as plugin updates or removal if no patch is available.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Reflected XSS in public-facing WordPress plugin enables T1190 (exploiting public-facing apps for initial access) and T1185 (browser session hijacking via script injection to steal cookies).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References