Cyber Posture

CVE-2025-23978

High

Published: 31 January 2025

Published
31 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0013 32.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-23978 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Ninos FlashCounter WordPress plugin (flashcounter) that enables Stored Cross-Site Scripting (XSS). The issue affects all versions of the plugin from unknown initial release (n/a) through 1.1.8. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction dependency, changed scope, and low impacts across confidentiality, integrity, and availability.

An unauthenticated attacker can exploit this vulnerability remotely by tricking a user—typically an authenticated WordPress administrator—into performing an unintended action, such as visiting a malicious webpage that submits a forged request. This CSRF action stores a malicious XSS payload within the FlashCounter plugin, enabling persistent script execution against subsequent users who view affected pages.

The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/flashcounter/vulnerability/wordpress-flashcounter-plugin-1-1-8-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) documents this vulnerability in the WordPress FlashCounter plugin version 1.1.8 and provides further details on the CSRF-to-Stored XSS issue.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Vulnerability in public-facing WordPress plugin directly enables exploitation via T1190; stored XSS payload facilitates arbitrary JavaScript execution in victim browsers via T1059.007.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References