CVE-2025-24636
Published: 24 January 2025
Description
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Security Summary
CVE-2025-24636 is a Cross-Site Request Forgery (CSRF) vulnerability in the MachForm Shortcode WordPress plugin developed by Rick Laymance, which enables Stored XSS. The flaw affects the machform-shortcode plugin in all versions from n/a through 1.4.1 inclusive. It is associated with CWE-352 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction, changed scope, and low impacts across confidentiality, integrity, and availability.
An attacker can exploit this vulnerability remotely without authentication by tricking an authenticated user into performing an unintended action, such as submitting a malicious form via a crafted webpage or link. This CSRF leads to Stored XSS, where malicious scripts are persistently injected and executed in the context of the victim's browser with elevated cross-origin privileges due to the changed scope.
The Patchstack advisory provides detailed analysis of the vulnerability, including remediation guidance for the MachForm Shortcode plugin. Security practitioners should consult https://patchstack.com/database/Wordpress/Plugin/machform-shortcode/vulnerability/wordpress-machform-shortcode-plugin-1-4-1-csrf-to-stored-xss-vulnerability?_s_id=cve for patch information and mitigation steps.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CVE describes a CSRF vulnerability in a public-facing WordPress plugin that directly enables Stored XSS via crafted links or pages, mapping to T1190 for remote exploitation of public-facing applications and T1185 for browser session hijacking through persistent malicious script injection with elevated privileges.