Cyber Posture

CVE-2025-25152

High

Published: 07 February 2025

Published
07 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0013 32.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-25152 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Smart DoFollow WordPress plugin developed by LukaszWiecek. This flaw enables Stored XSS and affects all versions of the plugin from its initial release through 1.0.2. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges, and scope change despite needing user interaction.

Attackers can exploit this vulnerability remotely without authentication by tricking a legitimate user, such as an authenticated administrator, into performing a malicious action via a forged request. This leads to the storage of XSS payloads on the site, which execute in the victim's browser context when pages are loaded, potentially allowing limited compromise of confidentiality, integrity, and availability.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/smart-dofollow/vulnerability/wordpress-smart-dofollow-plugin-1-0-2-csrf-to-stored-xss-vulnerability?_s_id=cve provides detailed information on the vulnerability, including potential mitigation steps for affected WordPress installations.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote CSRF-to-stored-XSS vulnerability in a public-facing WordPress plugin, directly enabling exploitation of public-facing applications without authentication.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References