Cyber Posture

CVE-2025-25142

High

Published: 03 March 2025

Published
03 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0023 45.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-25142 is an Improper Neutralization of Input During Web Page Generation vulnerability, enabling Stored Cross-site Scripting (XSS) as classified under CWE-79, in the WP Less Compiler plugin (wp-less-compiler) developed by The Jake Group for WordPress. This issue affects all versions of the plugin from its initial release through 1.3.0 inclusive. The vulnerability was published on 2025-03-03 with a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).

Unauthenticated attackers with network access can exploit this vulnerability by submitting malicious input that gets stored and reflected in generated web pages, though it requires user interaction such as a victim viewing the affected page. Exploitation changes scope and allows limited impacts on confidentiality, integrity, and availability, potentially enabling script execution in the victim's browser context to steal session data or perform other actions within the site's permissions.

The Patchstack advisory provides details on this vulnerability, including recommendations for mitigation, accessible at https://patchstack.com/database/Wordpress/Plugin/wp-less-compiler/vulnerability/wordpress-wp-less-compiler-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly enables remote exploitation of the web app (T1190), facilitates drive-by compromise via malicious page content (T1189), and supports browser session hijacking through script execution to steal session data (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References