Cyber Posture

CVE-2025-25161

High

Published: 03 March 2025

Published
03 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0035 57.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.

Security Summary

CVE-2025-25161 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-Site Scripting (XSS) under CWE-79, affecting the WP Find Your Nearest WordPress plugin developed by SocialEvolution. The issue impacts all versions of the plugin up to and including 0.3.1, with no lower bound specified. Published on March 3, 2025, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges, user interaction dependency, and changed scope.

Remote attackers without authentication can exploit this reflected XSS flaw by crafting malicious links or inputs that, when interacted with by a victim user (such as clicking a link or submitting a form), inject and execute arbitrary JavaScript in the victim's browser context. Successful exploitation enables limited impacts, including low-level disclosure of sensitive data (e.g., cookies or session tokens), minor data modification, and negligible denial of service, all within the scope of the compromised site.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/wp-find-your-nearest/vulnerability/wordpress-globalquran-plugin-1-0-csrf-to-settings-change-vulnerability-2?_s_id=cve provides details on the vulnerability, recommending mitigation through updating to a patched version of the WP Find Your Nearest plugin where available or removing the plugin if no update exists. Security practitioners should scan environments for vulnerable installations and apply defenses like Content Security Policy (CSP) to reduce XSS risks in the interim.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

Reflected XSS enables arbitrary JS execution in browser via malicious links (T1203 Exploitation for Client Execution, T1204.001 Malicious Link) and directly facilitates theft of session cookies/tokens as described.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References