Cyber Posture

CVE-2025-23758

High

Published: 22 January 2025

Published
22 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0023 45.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may log user keystrokes to intercept credentials as the user types them.

Security Summary

CVE-2025-23758 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, affecting the Pootle Button WordPress plugin (also referred to as pootlepress Pootle button pootle-button). This issue impacts all versions from n/a through 1.2.0. The vulnerability carries a CVSS v3.1 base score of 7.1, with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L, indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and changed scope.

Unauthenticated attackers can exploit this vulnerability remotely by crafting malicious input that is reflected back in the web page without proper neutralization. Exploitation requires tricking a user, such as an authenticated site visitor or administrator, into interacting with a malicious payload, typically via a phishing link or similar vector. Successful attacks enable arbitrary JavaScript execution in the victim's browser context, potentially allowing theft of session cookies, keystroke logging, or other client-side impacts, with low confidentiality, integrity, and availability effects but elevated risk from the changed scope.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/pootle-button/vulnerability/wordpress-pootle-button-plugin-1-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve details the Reflected XSS vulnerability in the Pootle Button plugin up to version 1.2.0 and serves as the primary reference for security practitioners seeking mitigation guidance.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1056.001 Keylogging Collection
Adversaries may log user keystrokes to intercept credentials as the user types them.
Why these techniques?

Reflected XSS vulnerability directly enables crafting malicious links (T1566.002) that execute arbitrary JS in victim browser, facilitating session cookie theft for hijacking (T1185) and keystroke logging (T1056.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References