Cyber Posture

CVE-2025-24684

High

Published: 03 February 2025

Published
03 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0004 12.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-24684 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Ederson Peka Media Downloader WordPress plugin (media-downloader). This issue affects all versions of the plugin from unknown initial release through 0.4.7.5.

The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating it is exploitable remotely over the network with low attack complexity and no required privileges, though it relies on user interaction. Attackers can trick authenticated users, such as WordPress administrators, into accessing a maliciously crafted URL or input reflected in the web page, enabling script execution in the victim's browser context with cross-origin scope changes and limited impacts on confidentiality, integrity, and availability, such as session hijacking or data theft.

The Patchstack advisory provides further details on this WordPress plugin vulnerability, including recommended mitigations such as updating to a patched version beyond 0.4.7.5: https://patchstack.com/database/Wordpress/Plugin/media-downloader/vulnerability/wordpress-media-downloader-plugin-0-4-7-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Reflected XSS in public-facing WordPress plugin directly enables exploitation of public-facing applications (T1190) and facilitates browser session hijacking via arbitrary script execution in admin context (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References