CVE-2025-26768
Published: 16 February 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-26768 is a Cross-Site Request Forgery (CSRF) vulnerability in the what3words Address Field 3-word-address-validation-field WordPress plugin, which allows Stored XSS. The issue affects all versions from unknown (n/a) through 4.0.15. It has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) and is associated with CWE-352.
Unauthenticated attackers (PR:N) can exploit this remotely over the network (AV:N) with low attack complexity (AC:L) by tricking authenticated users into performing actions via a malicious site, requiring user interaction (UI:R). Successful exploitation leads to Stored XSS with a scope change (S:C), enabling limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L).
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/3-word-address-validation-field/vulnerability/wordpress-what3words-address-field-plugin-4-0-15-csrf-to-stored-xss-vulnerability?_s_id=cve provides details on the vulnerability, with mitigation implied by updating beyond version 4.0.15.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
CSRF vulnerability in public-facing WordPress plugin directly enables exploitation of public-facing applications to inject stored XSS.