Cyber Posture

CVE-2025-26560

High

Published: 26 March 2025

Published
26 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0012 29.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-26560 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the KKWangen WP Contact Form III plugin (wp-contact-form-iii) for WordPress. This issue affects all versions of the plugin from n/a through 1.6.2d inclusive. Published on 2025-03-26, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and scope change.

A remote, unauthenticated attacker can exploit this vulnerability by crafting a malicious URL containing an XSS payload and tricking a victim user—such as a site visitor or administrator—into accessing it, for example via phishing or social engineering. User interaction is required, but once triggered, the payload executes in the victim's browser in the context of the vulnerable WordPress site, enabling potential theft of session tokens, cookies, or other sensitive data, as well as actions performed on the victim's behalf, with low impacts to confidentiality, integrity, and availability across the changed scope.

The primary advisory reference is available from Patchstack at https://patchstack.com/database/Wordpress/Plugin/wp-contact-form-iii/vulnerability/wordpress-wp-contact-form-iii-plugin-1-6-2d-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve, which details the vulnerability in the WP Contact Form III plugin up to version 1.6.2d. Security practitioners should review this source for recommended mitigations, such as plugin updates if patches are issued or temporary workarounds like input sanitization.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Reflected XSS in public-facing WordPress plugin enables exploitation of public-facing applications (T1190) to execute attacker-controlled JavaScript in the victim's browser (T1059.007) via malicious URL.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References