Cyber Posture

CVE-2025-25125

High

Published: 07 February 2025

Published
07 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0006 18.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-25125 is a Cross-Site Request Forgery (CSRF) vulnerability in the fyrebox-shortcode component of the CyrilG Fyrebox Quizzes WordPress plugin. This issue enables Stored Cross-Site Scripting (XSS) and affects Fyrebox Quizzes versions from n/a through 3.1 inclusive. The vulnerability is associated with CWE-352 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and scope change.

Unauthenticated attackers (PR:N) can exploit this vulnerability remotely (AV:N) with low complexity (AC:L), though it requires user interaction (UI:R), such as a victim visiting a malicious site. Exploitation involves tricking an authenticated user into submitting a forged request via CSRF, leading to stored XSS injection. This allows attackers to achieve low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L) within a changed security scope (S:C), potentially executing scripts in the context of other users viewing affected quiz content.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/fyrebox-shortcode/vulnerability/wordpress-fyrebox-quizzes-plugin-2-7-csrf-to-stored-xss-vulnerability?_s_id=cve documents this as a CSRF-to-stored XSS issue specifically in Fyrebox Quizzes plugin version 2.7, consistent with the broader CVE impact up to 3.1. Security practitioners should consult the advisory for recommended mitigations, such as updating to a patched version of the plugin.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

CSRF-to-stored XSS in public-facing WordPress plugin directly enables exploitation of the application (T1190) and facilitates arbitrary JavaScript execution in victim browsers via injected scripts (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References