CVE-2025-26573
Published: 26 March 2025
Description
Adversaries can use stolen session cookies to authenticate to web applications and services.
Security Summary
CVE-2025-26573 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, affecting the Rizzi Guestbook plugin (rizzi-guestbook) from JamRizzi Technologies. This WordPress plugin is vulnerable in all versions from n/a through 4.0.1 inclusive. The issue was published on 2025-03-26 with a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Attackers can exploit this remotely over the network with low complexity and no required privileges, but it necessitates user interaction, such as clicking a malicious link. Upon successful exploitation, arbitrary JavaScript executes in the context of the targeted user's browser due to the changed scope (S:C), potentially enabling limited impacts on confidentiality, integrity, and availability, such as stealing session cookies or performing actions on behalf of the victim.
The primary advisory reference is from Patchstack, detailing the XSS vulnerability in the WordPress Rizzi Guestbook plugin up to version 4.0.1. Security practitioners should review this source for specific mitigation recommendations, including any available patches or workarounds.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Reflected XSS allows arbitrary JavaScript execution in victim's browser, directly enabling T1059.007 (JavaScript), T1185 (Browser Session Hijacking), T1539 (Steal Web Session Cookie), and T1550.004 (Web Session Cookie) as described in the CVE impacts.