Cyber Posture

CVE-2025-23980

High

Published: 31 January 2025

Published
31 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0014 33.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-23980 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Full Circle WordPress plugin developed by James Andrews. This flaw enables Stored Cross-Site Scripting (XSS) and affects all versions of the plugin up to and including 0.5.7.8. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction dependency, and changed scope with low impacts across confidentiality, integrity, and availability.

Unauthenticated attackers can exploit this CSRF vulnerability by crafting malicious requests that trick authenticated users into submitting them unwittingly, such as via a malicious webpage. This allows attackers to store XSS payloads on the target site, which execute in the context of other users viewing affected content, potentially leading to session hijacking, data theft, or further site compromise depending on the payload.

The Patchstack advisory details this vulnerability and mitigation steps at https://patchstack.com/database/Wordpress/Plugin/full-circle/vulnerability/wordpress-full-circle-plugin-0-5-7-8-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Vulnerability in public-facing WordPress plugin directly enables exploitation of web application (T1190); stored XSS allows arbitrary JavaScript execution in victim browsers (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References