Cyber Posture

CVE-2025-23832

High

Published: 16 January 2025

Published
16 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0014 33.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-23832 is a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin Admin Cleanup (admin-cleanup) developed by Matt Gibbs that enables Stored XSS. The issue affects all versions of the plugin from n/a through 1.0.2 inclusive. It is associated with CWE-352 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility, low complexity, lack of required privileges, and scope change.

Attackers can exploit this vulnerability remotely without authentication by tricking authenticated users, such as site administrators, into performing unintended actions via a malicious webpage (user interaction required). This CSRF leads to Stored XSS, allowing injection of malicious scripts that persist on the site and execute in the victim's browser context, potentially resulting in low-level impacts on confidentiality, integrity, and availability.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/admin-cleanup/vulnerability/wordpress-admin-cleanup-plugin-1-0-2-csrf-to-stored-xss-vulnerability?_s_id=cve documents the vulnerability details. The affected version scope implies mitigation through updating to a version beyond 1.0.2.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

CSRF to stored XSS in public-facing WordPress plugin directly enables exploitation of web application (T1190) and injection/execution of malicious JavaScript in victim browser context (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References