CVE-2025-26931
Published: 25 February 2025
Description
Adversaries may abuse various implementations of JavaScript for execution.
Security Summary
CVE-2025-26931 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Tribulant Gallery Voting WordPress plugin developed by Tribulant Software. The flaw enables Stored Cross-Site Scripting (XSS) and affects all versions of the plugin from its initial release through 1.2.1. Published on 2025-02-25, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility and scope change.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity by tricking authenticated users into interacting with malicious content, such as visiting a crafted webpage. This user interaction triggers the CSRF to inject and store an XSS payload on the targeted site, potentially allowing script execution in the context of the WordPress site for subsequent visitors, including administrators.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/gallery-voting/vulnerability/wordpress-tribulant-gallery-voting-plugin-1-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CSRF to stored XSS vulnerability in a public-facing WordPress plugin directly enables exploitation of the application (T1190) and facilitates JavaScript execution in the browser context via XSS (T1059.007).