Cyber Posture

CVE-2025-24636

High

Published: 24 January 2025

Published
24 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0010 28.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-24636 is a Cross-Site Request Forgery (CSRF) vulnerability in the MachForm Shortcode WordPress plugin developed by Rick Laymance, which enables Stored XSS. The flaw affects the machform-shortcode plugin in all versions from n/a through 1.4.1 inclusive. It is associated with CWE-352 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction, changed scope, and low impacts across confidentiality, integrity, and availability.

An attacker can exploit this vulnerability remotely without authentication by tricking an authenticated user into performing an unintended action, such as submitting a malicious form via a crafted webpage or link. This CSRF leads to Stored XSS, where malicious scripts are persistently injected and executed in the context of the victim's browser with elevated cross-origin privileges due to the changed scope.

The Patchstack advisory provides detailed analysis of the vulnerability, including remediation guidance for the MachForm Shortcode plugin. Security practitioners should consult https://patchstack.com/database/Wordpress/Plugin/machform-shortcode/vulnerability/wordpress-machform-shortcode-plugin-1-4-1-csrf-to-stored-xss-vulnerability?_s_id=cve for patch information and mitigation steps.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

The CVE describes a CSRF vulnerability in a public-facing WordPress plugin that directly enables Stored XSS via crafted links or pages, mapping to T1190 for remote exploitation of public-facing applications and T1185 for browser session hijacking through persistent malicious script injection with elevated privileges.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References