Cyber Posture

CVE-2025-25070

High

Published: 03 March 2025

Published
03 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0023 45.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may forge web cookies that can be used to gain access to web applications or Internet services.

Security Summary

CVE-2025-25070 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Stored Cross-site Scripting (XSS) under CWE-79, in the WordPress plugin Album Reviewer by ed atrero. This issue affects all versions of Album Reviewer from n/a through 2.0.2.

The vulnerability can be exploited by unauthenticated attackers over the network (AV:N) with low attack complexity (AC:L), requiring user interaction (UI:R) such as viewing a malicious page. Exploitation changes scope (S:C) and results in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), enabling arbitrary JavaScript execution in the victim's browser context. This could allow attackers to steal session cookies, impersonate users, or perform actions on behalf of victims viewing the stored malicious content.

Patchstack's advisory at https://patchstack.com/database/Wordpress/Plugin/albumreviewer/vulnerability/wordpress-album-reviewer-plugin-2-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve documents the Stored XSS vulnerability in Album Reviewer 2.0.2, recommending that practitioners review it for mitigation guidance such as plugin updates or removal. The CVE was published on 2025-03-03 with a CVSS v3.1 base score of 7.1.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1606.001 Web Cookies Credential Access
Adversaries may forge web cookies that can be used to gain access to web applications or Internet services.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly enables T1190 (exploiting the web app vuln for injection), T1185 (arbitrary JS execution for browser session hijacking), and T1606.001 (stealing web cookies to impersonate users).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References