CVE-2025-25125
Published: 07 February 2025
Description
Adversaries may abuse various implementations of JavaScript for execution.
Security Summary
CVE-2025-25125 is a Cross-Site Request Forgery (CSRF) vulnerability in the fyrebox-shortcode component of the CyrilG Fyrebox Quizzes WordPress plugin. This issue enables Stored Cross-Site Scripting (XSS) and affects Fyrebox Quizzes versions from n/a through 3.1 inclusive. The vulnerability is associated with CWE-352 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and scope change.
Unauthenticated attackers (PR:N) can exploit this vulnerability remotely (AV:N) with low complexity (AC:L), though it requires user interaction (UI:R), such as a victim visiting a malicious site. Exploitation involves tricking an authenticated user into submitting a forged request via CSRF, leading to stored XSS injection. This allows attackers to achieve low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L) within a changed security scope (S:C), potentially executing scripts in the context of other users viewing affected quiz content.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/fyrebox-shortcode/vulnerability/wordpress-fyrebox-quizzes-plugin-2-7-csrf-to-stored-xss-vulnerability?_s_id=cve documents this as a CSRF-to-stored XSS issue specifically in Fyrebox Quizzes plugin version 2.7, consistent with the broader CVE impact up to 3.1. Security practitioners should consult the advisory for recommended mitigations, such as updating to a patched version of the plugin.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
CSRF-to-stored XSS in public-facing WordPress plugin directly enables exploitation of the application (T1190) and facilitates arbitrary JavaScript execution in victim browsers via injected scripts (T1059.007).