Cyber Posture

CVE-2025-26578

High

Published: 13 February 2025

Published
13 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0010 26.3th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-26578 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Simple Documentation WordPress plugin (client-documentation) developed by mathieuhays. This flaw allows for Stored Cross-Site Scripting (XSS) and affects all versions from unknown initial release through 1.2.8. The vulnerability received a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges, and scope change despite needing user interaction.

Attackers can exploit this vulnerability remotely without authentication by tricking authenticated users into interacting with a malicious webpage or link that submits a forged request to the vulnerable plugin. This enables the injection and storage of XSS payloads, which execute in the context of other users viewing the affected documentation, potentially leading to session hijacking, data theft, or further site compromise with low impacts on confidentiality, integrity, and availability.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/client-documentation/vulnerability/wordpress-simple-documentation-plugin-1-2-8-csrf-to-stored-xss-vulnerability?_s_id=cve provides details on this CSRF-to-stored-XSS issue in Simple Documentation version 1.2.8. Published on 2025-02-13, no specific patch details are outlined in available information, but updating beyond version 1.2.8 is implied for mitigation.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

CSRF to stored XSS in public-facing WordPress plugin enables T1190 (exploiting public app), T1059.007 (arbitrary JS execution via XSS payload), and T1185 (session hijacking via stolen cookies/data theft).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References