Cyber Posture

CVE-2025-23900

High

Published: 16 January 2025

Published
16 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0010 28.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-23900 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Genkisan Genki Announcement WordPress plugin (genki-announcement). It affects all versions from n/a through 1.4.1. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges, user interaction dependency, and cross-scope impact with low confidentiality, integrity, and availability effects. The issue was published on 2025-01-16.

Unauthenticated attackers (PR:N) can exploit this CSRF flaw over the network (AV:N) by tricking authenticated users into performing unintended actions, such as submitting malicious requests via a forged webpage or link that requires user interaction (UI:R), like clicking a button. Successful exploitation changes scope (S:C) and enables limited impacts: low-level compromise of confidentiality (C:L), integrity (I:L), and availability (A:L), potentially allowing unauthorized modifications or data exposure within the plugin's context.

Patchstack's advisory at https://patchstack.com/database/Wordpress/Plugin/genki-announcement/vulnerability/wordpress-genki-announcement-plugin-1-4-1-csrf-to-stored-xss-vulnerability?_s_id=cve details the vulnerability, referring to it as a CSRF-to-stored-XSS issue in Genki Announcement plugin version 1.4.1; security practitioners should consult this for specific patch or mitigation guidance, such as updating to a fixed version if available.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

CSRF in public-facing WordPress plugin directly maps to T1190 for exploitation; CSRF-to-stored-XSS enables browser session hijacking via T1185.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References