Cyber Posture

CVE-2025-24749

High

Published: 31 January 2025

Published
31 January 2025
Modified
28 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0014 33.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-24749 is a Cross-Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, in the EZPZ SAML SP Single Sign On (SSO) WordPress plugin from Overt Software Solutions LTD. It affects all versions of the plugin from n/a through 1.2.5. The vulnerability carries a CVSS v3.1 base score of 7.1, with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L, indicating network accessibility, low attack complexity, no required privileges, user interaction needed, changed scope, and low impacts across confidentiality, integrity, and availability.

An unauthenticated attacker can exploit this CSRF flaw remotely by tricking an authenticated user into submitting a malicious request, such as via a forged link or form on a malicious site. Exploitation requires user interaction but no special privileges, enabling the attacker to perform unauthorized actions on behalf of the victim within the affected WordPress site.

The Patchstack advisory (https://patchstack.com/database/wordpress/plugin/ezpz-sp/vulnerability/wordpress-ezpz-saml-sp-single-sign-on-sso-plugin-1-2-5-csrf-to-stored-xss-vulnerability?_s_id=cve) describes this as a CSRF-to-stored XSS vulnerability in EZPZ SAML SP Single Sign On (SSO) plugin version 1.2.5. Security practitioners should check for plugin updates or patches from the vendor and apply them promptly, while considering temporary mitigations like CSRF token enforcement or disabling the plugin if SAML SSO is not essential.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

CSRF-to-stored XSS in public-facing WordPress plugin directly enables T1190 (exploit public-facing app) and T1059.007 (JavaScript execution via XSS payload).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References